TY - GEN
T1 - High-speed pipelined hardware architecture for galois counter mode
AU - Satoh, Akashi
AU - Sugawara, Takeshi
AU - Aoki, Takafumi
PY - 2007
Y1 - 2007
N2 - In the authenticated encryption mode GCM (Galois Counter Mode), the CTR (counter) mode for data encryption that has no feedback path can easily be pipelined to boost the operating frequency of a hardware implementation. However, the hash function for the authentication tag generation performs multiply-add operations sequentially by chaining the result in the previous cycle, and this becomes the critical path in the high-speed GCM hardware. Therefore, we propose a high-speed pipelined hardware architecture for GCM in conjunction with a pipelined multiply-adder on a Galois field GF(2 128). This architecture was implemented with a 4-stage pipelined multiply-adder and a 56-stage pipelined AES (Advanced Encryption Standard) circuit by using a 0.13-um CMOS standard cell library. This implementation showed very high throughput of 54.94 Gbps with 272 Kgates for the key lengths of 128, 192, and 256 bits. The high hardware efficiency (throughput/gate) of 201.75 Kbps/gate is also an improvement over prior art.
AB - In the authenticated encryption mode GCM (Galois Counter Mode), the CTR (counter) mode for data encryption that has no feedback path can easily be pipelined to boost the operating frequency of a hardware implementation. However, the hash function for the authentication tag generation performs multiply-add operations sequentially by chaining the result in the previous cycle, and this becomes the critical path in the high-speed GCM hardware. Therefore, we propose a high-speed pipelined hardware architecture for GCM in conjunction with a pipelined multiply-adder on a Galois field GF(2 128). This architecture was implemented with a 4-stage pipelined multiply-adder and a 56-stage pipelined AES (Advanced Encryption Standard) circuit by using a 0.13-um CMOS standard cell library. This implementation showed very high throughput of 54.94 Gbps with 272 Kgates for the key lengths of 128, 192, and 256 bits. The high hardware efficiency (throughput/gate) of 201.75 Kbps/gate is also an improvement over prior art.
UR - http://www.scopus.com/inward/record.url?scp=38149050593&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38149050593&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-75496-1_8
DO - 10.1007/978-3-540-75496-1_8
M3 - Conference contribution
AN - SCOPUS:38149050593
SN - 9783540754954
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 118
EP - 129
BT - Information Security - 10th International Conference, ISC 2007, Proceedings
PB - Springer Verlag
T2 - 10th Information Security Conference, ISC 2007
Y2 - 9 October 2007 through 12 October 2007
ER -