Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/17789
DC FieldValueLanguage
dc.contributor.authorMihajloska Trpcheska, Hristinaen_US
dc.contributor.authorBilge Kavun, Elifen_US
dc.contributor.authorYalcin, Tolgaen_US
dc.date.accessioned2022-05-30T09:27:23Z-
dc.date.available2022-05-30T09:27:23Z-
dc.date.issued2017-12-06-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/17789-
dc.description.abstractAuthenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel with widespread use of the Internet and has led to several new schemes. There have been studies investigating software performance of various schemes. However, the same is yet to be done for hardware. We present a comprehensive survey of hardware (specifically ASIC) performance of the most commonly used AE schemes in the literature. These schemes include encrypt-thenMAC combination, block cipher based AE modes, and the recently-introduced permutation-based AE scheme. For completeness, we implemented each scheme with various standardized block ciphers and/or hash algorithms, and their lightweight versions. Our evaluation targets minimizing the timearea product while maximizing the throughput on an ASIC platform. We used 45 nm NANGATE Open Cell Library for syntheses. We present area, speed, time-area product, throughput, and power figures for both standard and lightweight versions of each scheme. We also provide an unbiased discussion on the impact of the structure and complexity of each scheme on hardware implementation. Our results reveal 13-30% performance boost in permutation-based AE compared to conventional schemes and they can be used as a benchmark in the ongoing AE competition CAESAR.en_US
dc.publisherACMen_US
dc.relation.ispartofACM Computing Surveys (CSUR)en_US
dc.subjectauthenticated encryption, hardware performance, authenticated encryption mode, CBCHMAC algorithm, permutation-based authenticated encryptionen_US
dc.titleA Survey on Authenticated Encryption--ASIC Designer’s Perspectiveen_US
dc.typeJournal Articleen_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
Appears in Collections:Faculty of Computer Science and Engineering: Journal Articles
Files in This Item:
File Description SizeFormat 
2019-739.pdf1.96 MBAdobe PDFView/Open
Show simple item record

Page view(s)

17
checked on May 19, 2024

Download(s)

30
checked on May 19, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.