2010
DOI: 10.1109/tc.2010.64
|View full text |Cite
|
Sign up to set email alerts
|

Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes

Abstract: Abstract-Tweakable enciphering schemes are length-preserving block cipher modes of operation that provide a strong pseudorandom permutation. It has been suggested that these schemes can be used as the main building blocks for achieving in-place disk encryption. In the past few years, there has been an intense research activity toward constructing secure and efficient tweakable enciphering schemes. But actual experimental performance data of these newly proposed schemes are yet to be reported. In this paper, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
10
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 37 publications
1
10
0
Order By: Relevance
“…In those modes where both block-cipher and multiplier blocks were required, the critical path was decided by the later block. The obtained throughput figures were satisfactory with the design goal which was meant to match the speed of the modern day disk controllers (the interested reader can see [17] for a detailed discussion of the design decisions and the results obtained in that work). In [17], the constructions reported in [22] were not included as these constructions are more recent.…”
supporting
confidence: 59%
See 2 more Smart Citations
“…In those modes where both block-cipher and multiplier blocks were required, the critical path was decided by the later block. The obtained throughput figures were satisfactory with the design goal which was meant to match the speed of the modern day disk controllers (the interested reader can see [17] for a detailed discussion of the design decisions and the results obtained in that work). In [17], the constructions reported in [22] were not included as these constructions are more recent.…”
supporting
confidence: 59%
“…Almost all known TES schemes known before [22] were implemented in various hardware platforms in [17]. In [17], a careful analysis of the possible parallelism for all the modes was done and the designs tried to exploit the schemes' parallelism to their fullest extent.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…Table 1 and Figure 2 compare existing algorithms with our new TCT 1 and TCT 2 constructions in terms of computational cost and security, respectively. Note that the finite field operations counted in Table 1 take hundreds of cycles in software [25,4], whereas their cost relative to an AES blockcipher invocation is much lower in hardware [26]. TCT 1 is the first tweakable cipher to require only a single blockcipher invocation and no extra finite field multiplications for each additional n bits of input, while TCT 2 is the first to provide beyond-birthday-bound security (and still gets away with a fixed number of finite field multiplications).…”
Section: Related Workmentioning
confidence: 99%
“…To our knowledge the only works which report implementations of TES in hardware are [15,31]. The designs in [31] are targeted towards the Xilinx Virtex 4 family of FPGAs while the designs in [15] were targeted towards the Virtex 5 family. The throughput reported in [15] is very encouraging as for all reported designs more than 10 Gbits/sec of throughput is obtained.…”
Section: Introductionmentioning
confidence: 99%