Athena - Automated Tool for Hardware Evaluation: Software Environment for Fair and Comprehensive Performance Evaluation of Cryptographic Hardware Using Fpgas

نویسنده

  • Venkata Amirineni
چکیده

ATHENA AUTOMATED TOOL FOR HARDWARE EVALUATION: SOFTWARE ENVIRONMENT FOR FAIR AND COMPREHENSIVE PERFORMANCE EVALUATION OF CRYPTOGRAPHIC HARDWARE USING FPGAS Venkata Amirineni, MS George Mason University, 2010 Thesis Director: Dr. Kris Gaj Fair comparison of the hardware efficiency of cryptographic algorithms, modeled in Hardware Description Languages and implemented using FPGAs, is a complex task. The results of the comparison depend on the inherent properties of competing algorithms, as well as on selected hardware architectures, implementation techniques, FPGA families, languages and tools. The development of new cryptographic standards through contests, such as AES, eSTREAM, and SHA-3 competitions, requires fair comparison of multiple cryptographic algorithms in terms of their hardware efficiency. To address this issue and to provide a comprehensive environment for an efficient evaluation of multiple algorithms, ATHENa, Automated Tool for Hardware EvaluatioN, has been developed. ATHENa facilitates fair, comprehensive, reliable, and automated comparison of cryptographic algorithms, hardware architectures, FPGA families, as well as FPGA tools and HDL languages. In this seminar, we present the common pitfalls and difficulties involved with the fair comparisons and demonstrate the capabilities of ATHENa through several case studies. Chapter 1: Introduction 1.1 Statement of the Problem Fair comparison of hardware implementations of cryptography is at the basis of progress in cryptographic engineering. New hardware architectures and optimization techniques have to be compared to the current state of the art. The development of new cryptographic standards through contests, such as AES [1], eSTREAM [2], and SHA-3 competitions [3], requires fair comparison of multiple cryptographic algorithms in terms of their hardware efficiency. Revealing source codes is often not an option because of the authors’ concerns regarding their intellectual property rights, export restrictions, and/or possible loss of profits from licensing hardware cores. This thesis reports on a comprehensive environment, Automated Tool for Hardware EvaluatioN (ATHENa) [4] that facilitates the fair comparison of cryptographic implementations, modeled in Hardware Description Language (HDL), without revealing the source codes. The project was inspired by a similar environment for comparing software implementations of cryptography, developed by Daniel Bernstein and Tanja Lange, called eBACS (ECRYPT Benchmarking of Cryptographic Systems) [5]. ATHENa allows the characterization of cryptographic algorithms using the FPGAs from multiple vendors, especially Xilinx and Altera. The system also provides different features such as the choice of an FPGA device within a given family, choice of optimum synthesis and implementation options, scanning through multiple placement starting points, and post processing of implementation reports.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ATHENa – Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Algorithms using FPGAs

In this talk, we will introduce an open-source en­ vironment, called ATHENa for fair, comprehensive, automated, and collaborative hardware benchmarking of cryptographic al­ gorithms. We believe that this environment is very suitable for use in evaluation of hardware performance of SHA-3 candidates from the point of view of speed, resource utilization, cost, power consumption, etc. At this point...

متن کامل

Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs

Performance in hardware has been demonstrated to be an important factor in the evaluation of candidates for cryptographic standards. Up to now, no consensus exists on how such an evaluation should be performed in order to make it fair, transparent, practical, and acceptable for the majority of the cryptographic community. In this paper, we formulate a proposal for a fair and comprehensive evalu...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Designing and Creating a Virtual Reality Environment and a Wearable Glove with Control and Evaluation Capability to Rehabilitate Patients

Introduction: Using modern technologies like virtual reality in rehabilitation can promise a great movement in medical sciences as sometimes, these technologies shorten the path of reaching the goal. In the present study, a virtual reality environment with the ability of physical interaction was designed to test and measure the hand motion, and a sample of electronic equipment was presented alo...

متن کامل

Designing and Creating a Virtual Reality Environment and a Wearable Glove with Control and Evaluation Capability to Rehabilitate Patients

Introduction: Using modern technologies like virtual reality in rehabilitation can promise a great movement in medical sciences as sometimes, these technologies shorten the path of reaching the goal. In the present study, a virtual reality environment with the ability of physical interaction was designed to test and measure the hand motion, and a sample of electronic equipment was presented alo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010