Abstract
MMX is a new technology to accelerate multimedia applications on Pentium processors. We report an implementation of IDEA on a Pentium MMX that is 1:65 times faster than any previously known implementation on the Pentium. By parallelizing four IDEA’s we reach an unprecedented 78 Mbits/s throughput per output block on a 166MHz MMX. In the light of rapidly increasing popularity of multimedia applications, causing more dedicated hardware to be built, and observing that most of the current block ciphers do not benefit from MMX, we raise the problem of designing block ciphers (and encryption modes) fully utilizing the basic operations of multimedia.
Chapter PDF
Similar content being viewed by others
References
Krste Asanović and David Johnson. Torrent Architecture Manual. Technical report, The International Computer Science Institution, Berkley, December 1996. Technical report TR-96-056.
Carolynn Burwick, Don Coppersmith, Edward D’Avignon, Rosario Gennaro, Shai Halevi, Charanjit Jutla, Stephen M. Matyas Jr., Luke O’Connor, Mohammad Peyravian, David Safford, and Nevenko Zunic. MARS — A Candidate Cipher for AES. Available at http://www.research.ibm.com/security/mars.html, June 1998.
Mihir Bellare, Anand Desai, E. Jokipii, and Phil Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation. In Proceedings of 38th Annual Symposium on Foundations of Computer Science, 1997.
Antoon Bosselaers, René Govaerts, and Joos Vandewalle. Fast Hashing on the Pentium. In Neal Koblitz, editor, Advances in Cryptology — CRYPTO’ 96, volume 1109 of Lecture Notes in Computer Science, pages 298–312. Springer-Verlag, 1996.
Eli Biham. A Fast New DES Implementation in Software. In Eli Biham, editor, Fast Software Encryption’ 97, volume 1267 of Lecture Notes in Computer Science, pages 261–272. Springer-Verlag, 1997.
Alex Biryukov and Eyal Kushilevitz. From Differential Cryptanalysis to Ciphertext-Only Attacks. In Hugo Krawczyk, editor, Advances in Cryptology — CRYPTO’ 98, volume 1462 of Lecture Notes in Computer Science, pages 72–88. Springer-Verlag, 1998.
Johan Borst, Lars R. Knudsen, and Vincent Rijmen. Two Attacks on Reduced IDEA. In Walter Fumy, editor, Advances in Cryptology — EUROCRYPT’ 97, pages 1–13. Springer-Verlag, 1997.
Antoon Bosselaers. Even faster hashing on the Pentium. Presented at the rump session of Eurocrypt’97, 1997.
Ahto Buldas and Jüri Poldre. A VLSI implementation of RSA and IDEA encryption engine. In NORCHIP’97, 1997.
Craig S. K. Clapp. Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors. In Eli Biham, editor, Fast Software Encryption’ 97, volume 1267 of Lecture Notes in Computer Science, pages 273–287. Springer-Verlag, 1997.
Joan Daemen and Craig S. K. Clapp. Fast Hashing and Stream Encryption with Panama. In Serge Vaudenay, editor, Fast Software Encryption’ 98, volume 1372 of Lecture Notes in Computer Science, pages 60–74. Springer-Verlag, 1998.
Joan Daemen, René Govaerts, and Joos Vandewalle. Weak Keys for IDEA. In Douglas R. Stinson, editor, Advances in Cryptology — CRYPTO’ 93, volume 773 of Lecture Notes in Computer Science, pages 224–231. Springer-Verlag, 1994.
Hans Dietz. Technical Summary: SWAR Technology. Technical report, School of Electrical and Computer Engineering, Purdue University, February 1997. Available at http://dynamo.ecn.purdue.edu/~hankd/SWAR/over.html.
Joan Daemen, Lars Knudsen, and Vincent Rijmen. The block cipher Square. In Eli Biham, editor, Fast Software Encryption, volume 1267 of Lecture Notes in Computer Science, pages 149–165. Springer-Verlag, 1997.
Philip Hawkes. Differential-LinearWeak Key Classes of IDEA. In Kaisa Nyberg, editor, Advances in Cryptology — EUROCRYPT’ 98, volume 1403 of Lecture Notes in Computer Science, pages 112–126. Springer-Verlag, 1998.
Shai Halevi and Hugo Krawczyk. MMH: Software Message Authentication in the Gbit/Second Rates. In Eli Biham, editor, Fast Software Encryption’ 97, volume 1267 of Lecture Notes in Computer Science, pages 172–189. Springer-Verlag, 1997.
Intel. Intel Architecture Optimization Manual, 1997. Order Number 242816-003.
Intel. Intel Architecture Software Developer’s Manual. Volume 1: Basic architecture, 1997. Order Number 243190.
Paul Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Neal Koblitz, editor, Advances in Cryptology — CRYPTO’ 88, volume 1109 of Lecture Notes in Computer Science, pages 104–113, 1996.
Masayasu Kumagai. Implementation of IDEA on MMX. Available at http://www2s.biglobe.ne.jp/~kumagai/idea mmx.zip, April 1997.
Michael Kwan. Bitslice DES. Unpublished. Information available from http://www.cs.mu.oz.au/ mkwan/bitslice/Welcome.html, May 1998.
Xuejia Lai and James Massey. A proposal for a new block encryption standard. In Ivan Bjerre Damgåard, editor, Advances in Cryptology — EUROCRYPT’ 90, volume 473 of Lecture Notes in Computer Science, pages 389–404. Springer-Verlag, 1990.
Xuejia Lai, James L. Massey, and Sean Murphy. Markov Ciphers and Differential Cryptanalysis. In D. W. Davies, editor, Advances in Cryptology — EUROCRYPT’ 91, volume 547 of Lecture Notes in Computer Science, pages 17–38. Springer-Verlag, 1991.
J. Massey. SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. In Ross Anderson, editor, Fast Software Encryption, volume 809 of Lecture Notes in Computer Science, pages 1–17. Springer Verlag, 1994.
Motorola. AltiVec Technology Programming Environments Manual, May 1998. A preliminary revision 0.2.
Alfred J. Menezes, Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.
Bart Preneel, Vincent Rijmen, and Antoon Bosselaers. Recent Developments in the Design of Conventional Algorithms. In B. Preneel, R. Govaerts, and J. Vandewalle, editors, Computer Security and Industrial Cryptography, State of the Art and Evolution, volume 1528 of Lecture Notes in Computer Science, pages 90–115. Springer-Verlag, 1998.
Ronald L. Rivest. The RC5 Encryption Algorithm. In Bart Preneel, editor, Fast Software Encryption, volume 1008 of Lecture Notes in Computer Science, pages 86–96. Springer-Verlag, 1995.
Ronald L. Rivest, Matt J. B. Robshaw, R. Sidney, and Y. L. Yin. The RC6 Block Cipher. Available at http://theory.lcs.mit.edu/~rivest/rc6.ps, June 1998.
Takeshi Shimoyama, Seiichi Amada, and Shiho Moriai. Improved Fast Software Implementation of Block Ciphers. In International Conference on Information and Communications Security’ 97, volume 1334 of Lecture Notes in Computer Science, pages 269–273, September 1997.
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson. Twofish: A 128-Bit Block Cipher. In Selected Areas in Cryptography’ 98, June 1998. Lecture Notes in Computer Science (these proceedings).
Bruce Schneier and Doug Whiting. Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. In Eli Biham, editor, Fast Software Encryption’ 97, volume 1267 of Lecture Notes in Computer Science, pages 242–259. Springer-Verlag, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lipmaa, H. (1999). IDEA: A Cipher for Multimedia Architectures?. In: Tavares, S., Meijer, H. (eds) Selected Areas in Cryptography. SAC 1998. Lecture Notes in Computer Science, vol 1556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48892-8_20
Download citation
DOI: https://doi.org/10.1007/3-540-48892-8_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65894-8
Online ISBN: 978-3-540-48892-7
eBook Packages: Springer Book Archive