Cryptographic Engineering 2009
DOI: 10.1007/978-0-387-71817-0_12
|View full text |Cite
|
Sign up to set email alerts
|

Block Cipher Modes of Operation from a Hardware Implementation Perspective

Abstract: Block ciphers are one of the most important primitives in cryptology. They are based on well-understood mathematical and cryptographic principles. Due to their inherent efficiency, these ciphers are used in many kinds of applications which require bulk encryption at high speed.Generally speaking, a block cipher consists of at least two closely related algorithms: block encryption and block decryption. Block encryption takes as an input a fixed-length block (known as the plaintext) and transform it into another… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(9 citation statements)
references
References 36 publications
0
9
0
Order By: Relevance
“…The obtained place-and-route simulation results are summarized in Table 9. 6 Let us recall that Tables 6, 7, and 8 present the Virtex 4 implementation results achieved by the TES modes when using a full pipelined, sequential, and encryption-only AES core designs, respectively. The first three portions in Table 9 show the performances obtained by those three designs when implemented on the Virtex 5 device xc5vlx110-3ff1153.…”
Section: Performance Comparison Of the Six Tes Modesmentioning
confidence: 99%
See 1 more Smart Citation
“…The obtained place-and-route simulation results are summarized in Table 9. 6 Let us recall that Tables 6, 7, and 8 present the Virtex 4 implementation results achieved by the TES modes when using a full pipelined, sequential, and encryption-only AES core designs, respectively. The first three portions in Table 9 show the performances obtained by those three designs when implemented on the Virtex 5 device xc5vlx110-3ff1153.…”
Section: Performance Comparison Of the Six Tes Modesmentioning
confidence: 99%
“…There exist numerous kinds of block cipher modes of operations designed for different functionalities, such as privacy-only modes, authenticated encryption, authenticated encryption with associated data, etc. [6]. None of these modes satisfy the requirements of low-level disk encryption.…”
Section: Introductionmentioning
confidence: 99%
“…Apart from transforming block algorithm into a streaming algorithm, CFB, OFB, and CTR modes of operation have another common feature; both encryption and decryption operations do not require any inverse block cipher calls . That characteristic can also be exploited in the parallelisation of some cryptographic algorithm through its minor modifications.…”
Section: Background and Related Workmentioning
confidence: 99%
“…As mentioned previously, any block algorithm operates as a key stream when used with CFB, OFB, and CTR modes of operation. Block algorithms with CFB, OFB, and CTR modes of operation do not involve inverse block cipher function as this function is provided through the mode construction itself .…”
Section: The Basic Ideamentioning
confidence: 99%
See 1 more Smart Citation