Advertisement

Evaluation of the XC6200-series architecture for cryptographic applications

  • Stephen Charlwood
  • Philip James-Roxby
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1482)

Abstract

Field-programmable gate arrays have been established as a suitable platform for implementing cryptographic algorithms since they provide much of the performance gains achievable through the use of custom hardware, whilst retaining the reconfigurability and ease of development benefits commonly associated with software. However, the efficiency with which a cryptographic algorithm can be implemented on a programmable device is dependent on the architecture of the device itself. Through a discussion of common cryptographic operations, and the implementation and testing of two algorithms, A5 and a reduced block-size variant of Blowfish, the suitability of the XC6200-series architecture for cryptographic applications is evaluated.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    M. Blaze, W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, M. Wiener, “Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security”, available on the Internet from http://www.counterpane.com/Google Scholar
  2. [2]
    B. Schneier, “Applied Cryptography”, John Wiley & Sons (1994) ISBN 0-471-11709-9Google Scholar
  3. [3]
    Xilinx, Inc: “XC6200 FPGA product description”, 1997Google Scholar
  4. [4]
    C. Adams, “Constructing Symmetric Ciphers Using the CAST Design Procedure”, available on the Internet from http://www.entrust.com/Google Scholar
  5. [5]
    B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish)”, Proc. of the Cambridge Security Workshop on Fast Software Encryption pp191–204, Springer-Verlag (1994)Google Scholar
  6. [6]
    E. Biham, L. Knudsen, R. Anderson, “Serpent: A New Block Cipher Proposal”, Proc. of the 5th International Workshop on Fast Software Encryption, Springer-Verlag (1998)Google Scholar
  7. [7]
    L. Knudsen, “DEAL — A 128-bit Block Cipher”, available on the Internet at http://www.ii.uib.no/~larsr/papers/deal2.ps.gzGoogle Scholar
  8. [8]
    M. Kwan, “The Design of the ICE Encryption Algorithm”, Proc. of the 4th International Workshop on Fast Software Encryption, Springer-Verlag (1997)Google Scholar
  9. [9]
    D. Wheeler, R. Needham, “TEA, a Tiny Encryption Algorithm”, available on the Internet at http://www.cl.cam.ac.uk/ftp/papers/djw-rmn/djw-rmn-tea.html (1994)Google Scholar
  10. [10]
    R. Rivest, “The RC5 Encryption Algorithm”, available on the Internet at http://theory.lcs.mit.edu/~rivest/rc5rev.ps (1997)Google Scholar
  11. [11]
    M. Matsui, “New Block Encryption Algorithm MISTY”, Proc. of the 4th International Workshop on Fast Software Encryption, Springer-Verlag (1997)Google Scholar
  12. [12]
    R. Rivest, M. Robshaw, R. Sidney, Y. Yin, “The RC6 Block Cipher”, available on the Internet at http://theory.lcs.mit.edu/~rivest/rc6.ps (1998)Google Scholar
  13. [13]
    L. Brown, J. Pieprzyk, “Introducing the new LOKI97 Block Cipher”, available on the Internet at http://www.adfa.oz.au/~lpb/research/loki97/loki97spec.ps (1998)Google Scholar
  14. [14]
    B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, “Twofish: A 128-Bit Block Cipher”, available on the Internet from http://www.counterpane.com/ (1998)Google Scholar
  15. [15]
    J. Massey, “SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm”, Proc. of the Cambridge Security Workshop on Fast Software Encryption, Springer-Verlag (1994)Google Scholar
  16. [16]
    B. Schneier, D. Whiting, “Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor”, Proc. of the 4th International Workshop on Fast Software Encryption, Springer-Verlag (1997)Google Scholar
  17. [17]
    Xilinx, Inc. “A Fast Constant-Coefficient Multiplier for the XC6200”, Xilinx Application Note (1997)Google Scholar
  18. [18]
    A. Omondi, “Computer Arithmetic Systems”, Prentice-Hall (1994) ISBN 0-13-334301-4Google Scholar
  19. [19]
    R. Anderson, “A5 — The GSM Encryption Algorithm”, available on the Internet at http://chem.leeds.ac.uk/ICAMS/people/jon/a5.html (1994)Google Scholar
  20. [20]
    C. Ding, V. Niemi, A. Renvall, A. Salomaa, “TWOPRIME: A Fast Stream Ciphering Algorithm”, Proc. of the 4th International Workshop on Fast Software Encryption, Springer-Verlag (1997)Google Scholar
  21. [21]
    I. Goldberg, D. Wagner, “Architectural Considerations for Cryptanalytic Hardware”, available on the Internet at http://www.cs.berkley.edu/~iang/isaac/hardware/ (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Stephen Charlwood
    • 1
  • Philip James-Roxby
    • 1
  1. 1.Digital Systems and Vision Processing Group School of Electronic and Electrical EngineeringThe University of BirminghamBirminghamUK

Personalised recommendations