A New Approach to the Development of Cryptographic Standards Based on the Use of High-level Synthesis Tools
نویسندگان
چکیده
The growing number of candidates competing in the cryptographic contests, such as SHA-3 and CAESAR, makes the hardware performance evaluation extremely time consuming, tedious, and imprecise, especially at the early stages of the competitions. The main difficulties include the long time necessary to develop and verify Register-Transfer Level (RTL), hardware description language code of all candidates. Each candidate may have more than one variant with various security parameters that should be explored. Additionally, multiple hardware architectures targeting different performance targets need to be developed. High-Level Synthesis (HLS), based on Xilinx Vivado HLS tool, offers a potential solution to the aforementioned problems. In order to verify a validity of this approach, we have applied both the traditional RTL methodology and the newly proposed HLS-based methodology to the comparison of three classes of cryptographic algorithms: symmetric-key block ciphers, hash function, and symmetrickey authentication ciphers. Candidates rankings for SHA-3 and CAESAR contests based on the two aforementioned methodologies are compared and analyzed. Our studies have demonstrated high correlation between the rankings of the evaluated algorithms, obtained using both investigated approaches. In particular, with some exception to CAESAR contest, due to the number of candidates, after applying HLS, the algorithm rankings in terms of three major performance metrics throughput, area, and throughput to area ratio have either remained unchanged or have been affected only for algorithms with very similar RTL performance. As a part of this research, HLS coding techniques and recommended coding styles are developed. Using this approach, our code performs within 30% of its RTL counterpart for the majority of investigated algorithms. Our HLS based designs have also shown significant improvement in terms of latency as compared to the most recently published HLS survey. In particular, we have observed on average a 20% or less overhead in terms of latency for implementations in the cryptographic domain using our proposed methodology, while the recent literature reports over 250% overhead in terms of the same metric.
منابع مشابه
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملConformity of Drug Abuse International Standards, Psychological and Sociologic Theories and Drug and Alcohol Use Prevention in Iran in 4 National Development Programs
Background: The international drug abuse standards were achieved by review of a vast meta-analysis in the world and released 2 years ago in Vienna. Review of national programs in recent 20 years and conformity of them is the main objective of this presentation. Methods: Based on research that was supported by UNODC and DCHQ, the demand reduction program in Iran at the mentioned time was studied...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملA New Method for Improving Computational Cost of Open Information Extraction Systems Using Log-Linear Model
Information extraction (IE) is a process of automatically providing a structured representation from an unstructured or semi-structured text. It is a long-standing challenge in natural language processing (NLP) which has been intensified by the increased volume of information and heterogeneity, and non-structured form of it. One of the core information extraction tasks is relation extraction wh...
متن کاملDevelopment of Quality Performance of National Digital Library with Kano's Model Approach
Background and Aim: The purpose of this study is to determine the quality requirements of the National Digital Library based on the Kano model and categorize users needs into three groups of: Basic, functional and motivational. Methods: This survey was conducted with a qualitative approach. The requirements of the digital library were extracted using two standards: "Digiqual manual" and the "D...
متن کاملDevelop a conceptual framework for social commerce in the sports industry
The purpose of this study was to designing a social business framework in the sports industry. The research method was qualitative with a systematic exploratory approach (content analysis). Selected. Statistical population of the research included two sections of human resources (managers and consultants of sports businesses, professors and experts in sports marketing and social media) and info...
متن کامل