A Lightweight 1.16 pJ/bit Processor for the Authenticated Encryption Scheme KetjeSR

被引:0
|
作者
Lu, Yun-Wen [1 ,2 ]
Purnal, Antoon [3 ]
Vandenhende, Simon [3 ]
Lee, Chen-Yi [1 ,2 ]
Verbauwhede, Ingrid [3 ]
Chang, Hsie-Chia [1 ,2 ]
机构
[1] Natl Chiao Tung Univ, Dept Elect Engn, Hsinchu, Taiwan
[2] Natl Chiao Tung Univ, Inst Elect, Hsinchu, Taiwan
[3] Katholieke Univ Leuven, Dept Elect Engn, Leuven, Belgium
关键词
D O I
10.1109/vlsi-dat.2019.8741601
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents the results of the first ASIC implementation of the authenticated encryption scheme KetjeSR. The design covers the encryption and decryption operation in combination with a handshake protocol for the data transfer. The chip implementation was done in a TSMC 90nm GUTM process. The encryption/decryption module has an area footprint of 12.2kGE. The processor reaches an end-to-end throughput of 2.08 Gbps when running at a clock frequency of 130 MHz. The design was further optimized for low power and consumes 2.421 mW. The optimization is based on the reuse of the permutation function in combination with extensive pipelining In terms of energy, the encryption operation costs 1.16 pJ/bit.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Panther: A Sponge Based Lightweight Authenticated Encryption Scheme
    Bhargavi, K. V. L.
    Srinivasan, Chungath
    Lakshmy, K., V
    PROGRESS IN CRYPTOLOGY, INDOCRYPT 2021, 2021, 13143 : 49 - 70
  • [2] An Efficient and Lightweight Deniably Authenticated Encryption Scheme for e-Mail Security
    Kar, Jayaprakash
    Naik, Kshirasagar
    Abdelkader, Tamer
    IEEE ACCESS, 2019, 7 : 184207 - 184220
  • [3] A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service
    Zheng, Qiming
    Wang, Xiaomin
    Khan, Muhammad Khurram
    Zhang, Wenfang
    Gupta, B. B.
    Guo, Wei
    IEEE ACCESS, 2018, 6 : 711 - 722
  • [4] Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme based on the Sponge Function
    Kim, HakJu
    Kim, Kwangjo
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 110 - 111
  • [5] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37
  • [6] Convertible authenticated encryption scheme
    Wu, TS
    Hsu, CL
    JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 62 (03) : 205 - 209
  • [7] A quantum authenticated encryption scheme
    Lü, X
    Ma, Z
    Feng, DG
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 2306 - 2309
  • [8] The COLM Authenticated Encryption Scheme
    Andreeva, Elena
    Bogdanov, Andrey
    Datta, Nilanjan
    Luykx, Atul
    Mennink, Bart
    Nandi, Mridul
    Tischhauser, Elmar
    Yasuda, Kan
    JOURNAL OF CRYPTOLOGY, 2024, 37 (02)
  • [9] The FCM Scheme for Authenticated Encryption
    Lei, Xiaomei
    Wu, Zhongdong
    Yong, Jiu
    PROCEEDINGS OF THE 2017 5TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY (ICMMCT 2017), 2017, 126 : 1123 - 1129
  • [10] The COLM Authenticated Encryption Scheme
    Elena Andreeva
    Andrey Bogdanov
    Nilanjan Datta
    Atul Luykx
    Bart Mennink
    Mridul Nandi
    Elmar Tischhauser
    Kan Yasuda
    Journal of Cryptology, 2024, 37