International Workshop on Cryptographic Hardware and Embedded Systems

CHES 2014: Cryptographic Hardware and Embedded Systems – CHES 2014 pp 392-413

ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption

  • Paweł Morawiecki
  • Kris Gaj
  • Ekawat Homsirikamol
  • Krystian Matusiewicz
  • Josef Pieprzyk
  • Marcin Rogawski
  • Marian Srebrny
  • Marcin Wójcik
Conference paper

DOI: 10.1007/978-3-662-44709-3_22

Volume 8731 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Morawiecki P. et al. (2014) ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption. In: Batina L., Robshaw M. (eds) Cryptographic Hardware and Embedded Systems – CHES 2014. CHES 2014. Lecture Notes in Computer Science, vol 8731. Springer, Berlin, Heidelberg

Abstract

This paper introduces our dedicated authenticated encryption scheme ICEPOLE. ICEPOLE is a high-speed hardware-oriented scheme, suitable for high-throughput network nodes or generally any environment where specialized hardware (such as FPGAs or ASICs) can be used to provide high data processing rates. ICEPOLE-128 (the primary ICEPOLE variant) is very fast. On the modern FPGA device Virtex 6, a basic iterative architecture of ICEPOLE reaches 41 Gbits/s, which is over 10 times faster than the equivalent implementation of AES-128-GCM. The throughput-to-area ratio is also substantially better when compared to AES-128-GCM. We have carefully examined the security of the algorithm through a range of cryptanalytic techniques and our findings indicate that ICEPOLE offers high security level.

Keywords

authenticated encryption scheme authenticated cipher ICEPOLE 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Paweł Morawiecki
    • 1
    • 2
  • Kris Gaj
    • 5
  • Ekawat Homsirikamol
    • 5
  • Krystian Matusiewicz
    • 8
  • Josef Pieprzyk
    • 3
    • 4
  • Marcin Rogawski
    • 7
  • Marian Srebrny
    • 1
    • 2
  • Marcin Wójcik
    • 6
  1. 1.Institute of Computer SciencePolish Academy of SciencesPoland
  2. 2.Section of InformaticsUniversity of CommerceKielcePoland
  3. 3.Department of ComputingMacquarie UniversityAustralia
  4. 4.Electrical Engineering and Computer Science School, Science and Engineering FacultyQueensland University of TechnologyBrisbaneAustralia
  5. 5.Cryptographic Engineering Research GroupGeorge Mason UniversityUSA
  6. 6.Cryptography and Information Security GroupUniversity of BristolUnited Kingdom
  7. 7.Cadence Design SystemsSan JoseUSA
  8. 8.IntelGdańskPoland