Fair and Comprehensive Benchmarking of 29 Round 2 CAESAR Candidates in Hardware: Preliminary Results
نویسندگان
چکیده
Cryptographic contests have emerged as a commonly accepted way of developing cryptographic standards. This process has appeared to work particularly well in case of Advanced Encryption Standard (AES), developed in the period 1997-2001, and Secure Hash Algorithm 3 (SHA-3), developed in the period 2007-2012. In 2013, a new contest, called CAESAR Competition for Authenticated Encryption: Security, Applicability, and Robustness has been announced. This contest is currently reaching the end of Round 2, with 29 candidates remaining. Performance of candidates in hardware has always been a very important evaluation factor, especially at the final stages of the competitions, when all remaining algorithms have been found to have adequate security strength. In CAESAR, for the first time, an attempt has been made to conduct hardware benchmarking of candidates at the very early stages of the contest, when the number of competing algorithms is still very large, namely there are still 29 authenticated cipher families remaining, with multiple variants for some of them (such as PRIMATEs). This early hardware evaluation has become possible in CAESAR because of the two novel approaches. First, the design teams have been asked to submit their own Verilog/VHDL code before the end of Round 2. Secondly, High-Level Synthesis, based on on the newly developed Xilinx Vivado HLS tool, has been applied to transform reference C implementations of CAESAR candidates to the corresponding efficient Register Transfer Level (RTL), hardware description language (HDL) code. Our group has contributed to this effort in multiple ways: First, we have proposed a universal hardware Application Programming Interface (API) for authenticated ciphers. The major parts of our proposal include: minimum compliance criteria, interface, communication protocol, and timing characteristics supported by the cores. All of these parts have been defined with the goals of guaranteeing (a) compatibility among implementations of the same algorithm by different designers, and (b) fair benchmarking of authenticated ciphers in hardware. This API is about to be adopted by the CAESAR Committee as a recommended way of implementing all remaining candidates in Verilog and VHDL. Second, we have developed a comprehensive package of VHDL and Python code supporting the development of implementations compliant with our API. This package includes in particular: a) VHDL code of generic pre-processing and postprocessing units, common for all modern authenticated ciphers, b) a universal testbench to verify the functionality of any CAESAR candidate implemented using our hardware API, c) a Python application used to automatically generate test vectors for this testbench, d) VHDL wrappers used to determine the maximum clock frequency and the resource utilization of all implementations, e) RTL VHDL source code of high-speed implementations of AES and the Keccak Permutation F, which may be used as building blocks in implementations of related ciphers, and f) several reference high-speed implementations of Dummy authenticated ciphers, implemented using our API and design methodology. All these resources have been made available in the public domain and documented using a comprehensive Implementer’s Guide. Third, we have developed RTL implementations of 16 CAESAR candidates and the current NIST standard, AESGCM, following the recommended API. Fourth, we have implemented 27 out of 29 Round 2 CAESAR candidates in hardware using the HLS-based approach. The only ones omitted were the two-pass algorithms, AEZ and HS1-SIV. For the 17 ciphers implemented using both RTL and HLS approaches, we have demonstrated that the ranking of candidates remains almost identical, independently of which approach is used. In this talk, we will present preliminary results of hardware benchmarking for all 29 Round 2 CAESAR candidates, and compare their implementations with the results for the current standard, AES-GCM. For the comparison using the RTL approach, we will present results for all Verilog/VHDL code submitted by the CAESAR design teams, as well as our own implementations. In case multiple implementations are available, only the best results obtained for each candidate will be taken into account. For the comparison using HLS approach, we will rely exclusively on the results obtained using HLS-ready C code generated by our group, based on the reference C implementations, submitted by design teams. The post place & route results will be generated for multiple FPGA families, and optimized using either ATHENa or 25 default optimization strategies available in Xilinx Vivado. All results will be presented in a graphical and easy to interpret form. Conclusions regarding the suitability of all Round 2 CAESAR candidates for high-speed, non-pipelined hardware implementations will be drawn, and the corresponding recommendations, regarding the advancement to Round 3, made to the CAESAR Committee. The differences between the RTL and HLS rankings will be identified and analyzed, leading to potential improvements in both kinds of implementations. The feasibility of applying HLS approach alone in the early stages of any future cryptographic contests will be investigated, and the appropriate conclusions drawn.
منابع مشابه
Cryptanalysis of some first round CAESAR candidates
ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES _ CMCCv₁ with the complexity of two queries and the success ...
متن کاملSoftware Benchmarking of the 2nd round CAESAR Candidates
Abstract. The software performance of cryptographic schemes is an important factor in the decision to include such a scheme in real-world protocols like TLS, SSH or IPsec. In this paper, we develop a benchmarking framework to perform software performance measurements on authenticated encryption schemes. In particular, we apply our framework to independently benchmark the 29 remaining 2nd round ...
متن کاملATHENa – Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Algorithms using FPGAs
In this talk, we will introduce an open-source en vironment, called ATHENa for fair, comprehensive, automated, and collaborative hardware benchmarking of cryptographic al gorithms. We believe that this environment is very suitable for use in evaluation of hardware performance of SHA-3 candidates from the point of view of speed, resource utilization, cost, power consumption, etc. At this point...
متن کاملA Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates
Authenticated encryption with Associated Data (AEAD) plays a significant role in cryptography because of its ability to provide integrity, confidentiality and authenticity at the same time. Due to the emergence of security at the edge of computing fabric, such as, sensors and smartphone devices, there is a growing need of lightweight AEAD ciphers. Currently, a worldwide contest, titled CAESAR, ...
متن کاملComputer-Aided Design Tools and Methodologies for Evaluating Candidates in Cryptographic Contests
Cryptographic contests have emerged as a commonly accepted way of developing cryptographic standards. A few representative examples include the AES (Advanced Encryption Standard) competition, conducted in the period 1998-2000, the SHA-3 (Secure Hash Algorithm 3) contest, organized in the period 2008-2012, and the CAESAR Competition for Authenticated Encryption: Security, Applicability, and Robu...
متن کامل