Ιδρυματικό Αποθετήριο
Πολυτεχνείο Κρήτης
EN  |  EL

Αναζήτηση

Πλοήγηση

Ο Χώρος μου

Design-space exploration of the most widely used cryptography algorithms

Papaefstathiou Ioannis, Sotiriou Christos, Papaefstathiou V.

Απλή Εγγραφή


URIhttp://purl.tuc.gr/dl/dias/568A6BD8-DEBB-467C-872C-7CBD7458A7E5-
Αναγνωριστικόhttps://doi.org/10.1016/j.micpro.2004.08.009-
Αναγνωριστικόhttp://www.sciencedirect.com/science/article/pii/S0141933104001012-
Γλώσσαen-
Μέγεθος11 pagesen
ΤίτλοςDesign-space exploration of the most widely used cryptography algorithmsen
ΔημιουργόςPapaefstathiou Ioannisen
ΔημιουργόςΠαπαευσταθιου Ιωαννηςel
ΔημιουργόςSotiriou Christosen
ΔημιουργόςΣωτηριου Χρηστοςel
Δημιουργός Papaefstathiou V.en
ΕκδότηςElsevieren
ΠερίληψηNetwork data are, currently, often encrypted at a low level. In addition, as it is widely supported, the majority of future networks will use low-layer (IP level) encryption. Moreover, current trends imply that future networks are likely to be dominated by mobile terminals, thus, the power consumption and electromagnetic emissions aspects of encryption devices will be critical. This paper presents several realizations of the two most widely used encryption algorithms, DES and AES, both in software and in hardware. We present software implementations of the algorithms running on two of the state-of-the-art Intel IXP Network Processors and 11 hardware realizations based on a standard-cell library. In particular, five of our hardware realizations are conventional flip-flop based clocked designs, whereas the other six are either asynchronous, or latch-based synchronous designs. We demonstrate that the most efficient realization of the DES algorithm is one of the proposed asynchronous hardware implementations, whereas for the AES algorithm the latch-based design presented seems to be optimal. By placing and routing those designs, we have also realized that the commercial ASIC synthesis tools cannot accurately predict the area and the performance of the placed and routed final netlist in such designs, since the ASIC implementations of the encrypted algorithms include a very large number of wires and a limited number of logic CMOS cells. en
ΤύποςPeer-Reviewed Journal Publicationen
ΤύποςΔημοσίευση σε Περιοδικό με Κριτέςel
Άδεια Χρήσηςhttp://creativecommons.org/licenses/by/4.0/en
Ημερομηνία2015-11-16-
Ημερομηνία Δημοσίευσης2004-
Βιβλιογραφική ΑναφοράI. Papaefstathiou, V. Papaefstathiou, C. Sotiriou, "Elsevier Journal on Microprocessors and Microsystems," vol. 28, no. 10, pp. 561-571, Sept. 2013. doi:10.1016/j.micpro.2004.08.009en

Υπηρεσίες

Στατιστικά