Hardware Performance of ELmD and ELmD(6,6)

نویسندگان

  • Lilian Bossuet
  • Nilanjan Datta
  • Cuauhtemoc Mancillas-López
  • Mridul Nandi
چکیده

ELmD (Encrypt-Linear mix-Decrypt) is a blockcipher based efficient authenticated encryption scheme, which is nonce misuse resistant, fully pipeline implementable. ELmD is a candidate for CAESAR competition and it has been selected for the second round. In this document, we first consider two versions of ELmDv2.0 (i) ELmD: full 10-round AES encryptiondecryption, no intermediate tag, fixed tag size and (ii) ELmD(6,6): 6-round AES encryption-decryption, no intermediate tag, fixed tag size. We provide the full specification for both the version and present hardware implementation of the combined encryptiondecryption for both these versions. We discuss and compare the hardware performance of these versions with other popular AE schemes like COPA and OCB.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm

In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide misuse resistant against forgeries and security against blockwise adaptive adversaries as well as 128-bit security against key recovery attacks. We scrutinize ElmD in such a way that we provide uni...

متن کامل

Fault Diagnosis of Wind Turbine Based on ELMD and FCM

In view of failure characteristics of wind turbine gear box, this paper puts forward a method for fault diagnosis based on the ensemble local means decomposition (ELMD) and fuzzy C-means clustering (FCM) method. Resolve the vibration signal of different fault state of high speed gear box by ELMD to obtain the PF component, and obtain its singular value, which is composed of known sample and tes...

متن کامل

Understanding RUP Integrity of COLM

The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a more involved invertible mixing function. In this work, we investigate the integrity of the COLM str...

متن کامل

Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core

The implementation of the AES encryption core by Moradi et al. at Eurocrypt 2011 is one of the smallest in terms of gate area. The circuit takes around 2400 gates and operates on an 8 bit datapath. However this is an encryption only core and unable to cater to block cipher modes like CBC and ELmD that require access to both the AES encryption and decryption modules. In this paper we look to inv...

متن کامل

ELMD: An Automatically Generated Entity Linking Gold Standard Dataset in the Music Domain

In this paper we present a gold standard dataset for Entity Linking (EL) in the Music Domain. It contains thousands of musical named entities such as Artist, Song or Record Label, which have been automatically annotated on a set of artist biographies coming from the Music website and social network LAST.FM. The annotation process relies on the analysis of the hyperlinks present in the source te...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017