Hardware Context Switch-based Cryptographic Accelerator for Handling Multiple Streams
- 12 August 2021
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Reconfigurable Technology and Systems
- Vol. 14 (3), 1-25
- https://doi.org/10.1145/3460941
Abstract
The confidentiality and integrity of a stream has become one of the biggest issues in telecommunication. The best available algorithm handling the confidentiality of a data stream is the symmetric key block cipher combined with a chaining mode of operation such as cipher block chaining (CBC) or counter mode (CTR). This scheme is difficult to accelerate using hardware when multiple streams coexist. This is caused by the computation time requirement and mainly by management of the streams. In most accelerators, computation is treated at the block-level rather than as a stream, making the management of multiple streams complex. This article presents a solution combining CBC and CTR modes of operation with a hardware context switching. The hardware context switching allows the accelerator to treat the data as a stream. Each stream can have different parameters: key, initialization value, state of counter. Stream switching was managed by the hardware context switching mechanism. A high-level synthesis tool was used to generate the context switching circuit. The scheme was tested on three cryptographic algorithms: AES, DES, and BC3. The hardware context switching allowed the software to manage multiple streams easily, efficiently, and rapidly. The software was freed of the task of managing the stream state. Compared to the original algorithm, about 18%–38% additional logic elements were required to implement the CBC or CTR mode and the additional circuits to support context switching. Using this method, the performance overhead when treating multiple streams was low, and the performance was comparable to that of existing hardware accelerators not supporting multiple streams.Keywords
This publication has 25 references indexed in Scilit:
- Combining Residue Arithmetic to Design Efficient Cryptographic Circuits and SystemsIEEE Circuits and Systems Magazine, 2016
- An Embedded Memory-Centric Reconfigurable Hardware Accelerator for Security ApplicationsInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 2015
- Finding the best FPGA implementation of the DES algorithm to secure smart cardsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- A Novel and Efficient Design for an RSA Cryptosystem With a Very Large Key SizeIEEE Transactions on Circuits and Systems II: Express Briefs, 2015
- A Side-channel Analysis Resistant Reconfigurable Cryptographic Coprocessor Supporting Multiple Block Cipher AlgorithmsPublished by Association for Computing Machinery (ACM) ,2014
- Fast and standalone Design Space Exploration for High-Level Synthesis under resource constraintsJournal of Systems Architecture, 2013
- Building a block cipher mode of operation with feedback keysPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Multi-architectural 128 bit AES-CBC Core based on Open-Source Hardware AES Implementations for Secure Industrial CommunicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Fast arithmetic for public-key algorithms in Galois fields with composite exponentsInternational Conference on Acoustics, Speech, and Signal Processing (ICASSP), 1999
- A new RSA cryptosystem hardware design based on Montgomery's algorithmIEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 1998