Institutional Repository
Technical University of Crete
EN  |  EL

Search

Browse

My Space

Design-space exploration of the most widely used cryptography algorithms

Papaefstathiou Ioannis, Sotiriou Christos, Papaefstathiou V.

Simple record


URIhttp://purl.tuc.gr/dl/dias/568A6BD8-DEBB-467C-872C-7CBD7458A7E5-
Identifierhttps://doi.org/10.1016/j.micpro.2004.08.009-
Identifierhttp://www.sciencedirect.com/science/article/pii/S0141933104001012-
Languageen-
Extent11 pagesen
TitleDesign-space exploration of the most widely used cryptography algorithmsen
CreatorPapaefstathiou Ioannisen
CreatorΠαπαευσταθιου Ιωαννηςel
CreatorSotiriou Christosen
CreatorΣωτηριου Χρηστοςel
Creator Papaefstathiou V.en
PublisherElsevieren
Content SummaryNetwork data are, currently, often encrypted at a low level. In addition, as it is widely supported, the majority of future networks will use low-layer (IP level) encryption. Moreover, current trends imply that future networks are likely to be dominated by mobile terminals, thus, the power consumption and electromagnetic emissions aspects of encryption devices will be critical. This paper presents several realizations of the two most widely used encryption algorithms, DES and AES, both in software and in hardware. We present software implementations of the algorithms running on two of the state-of-the-art Intel IXP Network Processors and 11 hardware realizations based on a standard-cell library. In particular, five of our hardware realizations are conventional flip-flop based clocked designs, whereas the other six are either asynchronous, or latch-based synchronous designs. We demonstrate that the most efficient realization of the DES algorithm is one of the proposed asynchronous hardware implementations, whereas for the AES algorithm the latch-based design presented seems to be optimal. By placing and routing those designs, we have also realized that the commercial ASIC synthesis tools cannot accurately predict the area and the performance of the placed and routed final netlist in such designs, since the ASIC implementations of the encrypted algorithms include a very large number of wires and a limited number of logic CMOS cells. en
Type of ItemPeer-Reviewed Journal Publicationen
Type of ItemΔημοσίευση σε Περιοδικό με Κριτέςel
Licensehttp://creativecommons.org/licenses/by/4.0/en
Date of Item2015-11-16-
Date of Publication2004-
Bibliographic CitationI. Papaefstathiou, V. Papaefstathiou, C. Sotiriou, "Elsevier Journal on Microprocessors and Microsystems," vol. 28, no. 10, pp. 561-571, Sept. 2013. doi:10.1016/j.micpro.2004.08.009en

Services

Statistics