Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes

被引:12
|
作者
Chakraborty, Debrup [1 ]
Mancillas-Lopez, Cuauhtemoc [1 ]
Rodriguez-Henriquez, Francisco [1 ]
Sarkar, Palash [2 ]
机构
[1] CINVESTAV IPN, Dept Comp Sci, Mexico City 07360, DF, Mexico
[2] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
关键词
Pipelined architecture; tweakable enciphering schemes; Karatsuba multiplier; disc encryption; polynomial evaluation; MODE;
D O I
10.1109/TC.2011.227
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A new class of polynomials was introduced by Bernstein (Bernstein 2007) which were later named by Sarkar as Bernstein-Rabin-Winograd (BRW) polynomials (Sarkar 2009). For the purpose of authentication, BRW polynomials offer considerable computational advantage over usual polynomials: (m - 1) multiplications for usual polynomial hashing versus vertical bar m/2 vertical bar multiplications and [log(2) m] squarings for BRW hashing, where m is the number of message blocks to be authenticated. In this paper, we develop an efficient pipelined hardware architecture for computing BRW polynomials. The BRW polynomials have a nice recursive structure which is amenable to parallelization. While exploring efficient ways to exploit the inherent parallelism in BRW polynomials we discover some interesting combinatorial structural properties of such polynomials. These are used to design an algorithm to decide the order of the multiplications which minimizes pipeline delays. Using the nice structural properties of the BRW polynomials we present a hardware architecture for efficient computation of BRW polynomials. Finally, we provide implementations of tweakable enciphering schemes proposed in Sarkar 2009 which use BRW polynomials. This leads to the fastest known implementation of disk encryption systems.
引用
收藏
页码:279 / 294
页数:16
相关论文
共 50 条
  • [11] Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes
    Sun, Zhelei
    Wang, Peng
    Zhang, Liting
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 3 - 19
  • [12] VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations
    Meunier, Quentin L.
    Taleb, Abdul Rahman
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 520 - 527
  • [13] Efficient Multiplication of Polynomials on Graphics Hardware
    Emeliyanenko, Pavel
    ADVANCED PARALLEL PROCESSING TECHNOLOGIES, PROCEEDINGS, 2009, 5737 : 134 - 149
  • [14] Efficient Software and Hardware Implementations of a QCSP Communication System
    Moniere, Camille
    Le Gal, Bertrand
    Boutillon, Emmanuel
    DESIGN AND ARCHITECTURE FOR SIGNAL AND IMAGE PROCESSING, DASIP 2022, 2022, 13425 : 29 - 41
  • [15] Efficient Hardware Implementations of Grain-128AEAD
    Sonnerup, Jonathan
    Hell, Martin
    Sonnerup, Mattias
    Khattar, Ripudaman
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 11898 : 495 - 513
  • [16] AN EFFICIENT ARCHITECTURE FOR HARDWARE IMPLEMENTATIONS OF IMAGE PROCESSING ALGORITHMS
    Khalvati, Farzad
    Tizhoosh, Hamid R.
    2009 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR IMAGE PROCESSING, 2009, : 20 - 26
  • [17] Efficient hardware implementations of QTL cipher for RFID applications
    Shrivastava N.
    Singh P.
    Acharya B.
    International Journal of High Performance Systems Architecture, 2020, 9 (01) : 1 - 10
  • [18] Leak Point Locating in Hardware Implementations of Higher-Order Masking Schemes
    Tang Ming
    Li Yanbin
    Zhao Dongyan
    Li Yuguang
    Yan Fei
    Zhang Huanguo
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (12) : 3008 - 3019
  • [19] Efficient hardware implementations of point multiplication for binary Edwards curves
    Rashidi, Bahram
    INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2018, 46 (08) : 1516 - 1533
  • [20] Efficient Hardware Implementations of Legendre Symbol Suitable for MPC Applications
    Tahen, Farhad
    Bayat-Sarmadi, Siavash
    Ebrahimi, Shahriar
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2022, 69 (03) : 1231 - 1239