2016
DOI: 10.1007/978-3-319-29078-2_8
|View full text |Cite
|
Sign up to set email alerts
|

Single-Cycle Implementations of Block Ciphers

Abstract: Abstract. Security mechanisms to protect our systems and data from malicious adversaries have become essential. Strong encryption algorithms are an important building block of these solutions. However, each application has its own requirements and it is not always possible to find a cipher that meets them all. This work compares unrolled combinatorial hardware implementations of six lightweight block ciphers, along with an AES implementation as a baseline. Up until now, the majority of such ciphers were design… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
20
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 26 publications
0
20
0
Order By: Relevance
“…Although AES is used in COPA's original design, our implementation uses PRINCE [3], which is highly efficient [16]. We placed two pipeline registers inside our PRINCE implementation to allow the MAC verification component to meet the timing constraint of 100 MHz (see Section 5.2).…”
Section: Mac Verificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Although AES is used in COPA's original design, our implementation uses PRINCE [3], which is highly efficient [16]. We placed two pipeline registers inside our PRINCE implementation to allow the MAC verification component to meet the timing constraint of 100 MHz (see Section 5.2).…”
Section: Mac Verificationmentioning
confidence: 99%
“…We placed two pipeline registers inside our PRINCE implementation to allow the MAC verification component to meet the timing constraint of 100 MHz (see Section 5.2). A three cycle implementation of AES will likely have a huge overhead in terms of area and delay, as observed by [16] in a comparison of single cycle implementations. PRINCE's 64-bit block size allows for more effective use of the Zynq's 64-bit HP0 port, since memory blocks received from HP0 can immediately be processed by our MAC primitive.…”
Section: Mac Verificationmentioning
confidence: 99%
“…In order to prevent tampered instructions from executing, MAC computation needs to occur in only a few cycles. Therefore, the cipher was unrolled to require only two cycles for each operation [36]. This reduces the maximum clock frequency of the processor, as the block cipher increases the critical path of the processor.…”
Section: Methodsmentioning
confidence: 99%
“…Lightweight block ciphers can be implemented at lower cost while maintaining the same or better circuit size, power consumption, and latency as conventional standard encryption AES. PRINCE 6,7 is a lightweight block cipher with excellent circuit size and latency. PRINCE has a high overall reputation for circuit size, processing speed, and peak power in comparison with other ciphers 4 in unrolled architecture implementation in which all cryptographic circuits are composed of combinational circuits.…”
Section: Introductionmentioning
confidence: 99%