Cover image for System-on-chip architectures and implementations for private-key data encryption
Title:
System-on-chip architectures and implementations for private-key data encryption
Personal Author:
Publication Information:
New York : Kluwer Academic/Plenum Publishers, 2003
ISBN:
9780306478826
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010080261 QA76.9.A25 M564 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

In System-on-Chip Architectures and Implementations for Private-Key Data Encryption, new generic silicon architectures for the DES and Rijndael symmetric key encryption algorithms are presented. The generic architectures can be utilised to rapidly and effortlessly generate system-on-chip cores, which support numerous application requirements, most importantly, different modes of operation and encryption and decryption capabilities. In addition, efficient silicon SHA-1, SHA-2 and HMAC hash algorithm architectures are described. A single-chip Internet Protocol Security (IPSec) architecture is also presented that comprises a generic Rijndael design and a highly efficient HMAC-SHA-1 implementation.

In the opinion of the authors, highly efficient hardware implementations of cryptographic algorithms are provided in this book. However, these are not hard-fast solutions. The aim of the book is to provide an excellent guide to the design and development process involved in the translation from encryption algorithm to silicon chip implementation.


Table of Contents

1 Background Theoryp. 1
1.1. Introductionp. 1
1.2. Cryptographic Algorithmsp. 2
1.3. Cryptanalysisp. 8
1.4. Hardware-Based Cryptographic Implementationp. 10
1.5. AES Development Effortp. 14
1.6. Rijndael Algorithm Finite Field Mathematicsp. 21
1.7. Conclusionsp. 26
2 Des Algorithm Architectures and Implementationsp. 28
2.1. Introductionp. 28
2.2. DES Algorithm Descriptionp. 29
2.3. DES Modes of Operationp. 32
2.4. Triple-DESp. 37
2.5. Review of Previous Workp. 38
2.6. Generic Parameterisable DES IP Architecture Designp. 40
2.7. Novel Key Scheduling Methodp. 48
2.8. Conclusionsp. 53
3 Rijndael Architectures and Implementationsp. 57
3.1. Introductionp. 57
3.2. Rijndael Algorithm Descriptionp. 58
3.3. Review of Rijndael Hardware Implementationsp. 63
3.4. Design of High Speed Rijndael Encryptor Corep. 65
3.5. Encryptor/Decryptor Corep. 70
3.6. Performance Resultsp. 72
3.7. Conclusionsp. 74
4 Further Rijndael Algorithm Architectures and Implementationsp. 77
4.1. Introductionp. 77
4.2. Look-Up Table Based Rijndael Architecturep. 78
4.3. Rijndael Modes of Operationp. 84
4.4. Overall Generic AES Architecturep. 87
4.5. Conclusionsp. 97
5 Hash Algorithms and Security Applicationsp. 99
5.1. Introductionp. 99
5.2. Internet Protocol Security (IPSec)p. 100
5.3. IPSec Authentication Algorithmsp. 105
5.4. IPSec Cryptographic Processor Designp. 107
5.5. Performance Resultsp. 112
5.6. IPSec Cryptographic Processor Use in Other Applicationsp. 115
5.7. SHA-384/SHA-512 Processorp. 117
5.8. Conclusionsp. 121
6 Concluding Summary and Future Workp. 125
6.1. Concluding Summaryp. 125
6.2. Future workp. 128
Appendix A Modulo Arithmeticp. 131
Appendix B DES Algorithm Permutations and S-Boxesp. 135
Appendix C LUTs Utilised in Rijndael Algorithmp. 139
Appendix D LUTs in LUT-Based Rijndael Architecturep. 143
Appendix E SHA-384/SHA-512 Constantsp. 151
Referencesp. 153
Indexp. 159