Efficient configurations for block ciphers with unified ENC/DEC paths

Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher, there may be multiple ways of constructing the combined encryption/decryption circuit, each targeted at optimizing lightweight design metrics like area or power etc. In this paper we look at how the choice of circuit configuration affects the energy required to perform one encryption/decryption. We begin by analyzing 12 circuit configurations for the Advanced Encryption Standard (AES-128) cipher and establish some design rules for energy efficiency. We then extend our analysis to several lightweight block ciphers. In the second part of the paper we also investigate area optimized circuits for combined implementations of these ciphers.
Original languageEnglish
Title of host publicationProceedings of 2017 IEEE International Symposium on Hardware Oriented Security and Trust
PublisherIEEE
Publication date2017
Pages41-46
ISBN (Print)9781538639290
DOIs
Publication statusPublished - 2017
Event2017 IEEE International Symposium on Hardware Oriented Security and Trust - The Ritz-Carlton, McLean, United States
Duration: 1 May 20175 May 2017

Conference

Conference2017 IEEE International Symposium on Hardware Oriented Security and Trust
LocationThe Ritz-Carlton
CountryUnited States
CityMcLean
Period01/05/201705/05/2017
Series2017 Ieee International Symposium on Hardware Oriented Security and Trust (host)

Keywords

  • Computer architecture
  • Ciphers
  • Encryption
  • Wires
  • Energy consumption
  • Logic gates

Fingerprint Dive into the research topics of 'Efficient configurations for block ciphers with unified ENC/DEC paths'. Together they form a unique fingerprint.

Cite this