Software Implementation Performances of Block Ciphers: A Systematic Literature Review

Baris Berk Zorba, A. Z. Alkar, Murat Aydos, A. Tarhan
{"title":"Software Implementation Performances of Block Ciphers: A Systematic Literature Review","authors":"Baris Berk Zorba, A. Z. Alkar, Murat Aydos, A. Tarhan","doi":"10.1109/IWBIS56557.2022.9924700","DOIUrl":null,"url":null,"abstract":"One of the important milestones of information security, block ciphers, are symmetric-key encryption algorithms that encrypt fixed-length inputs. The main purpose of this research is to analyze software implementations of block ciphers using the research method of the systematic literature review (SLR) proposed in software engineering and analyze them based on their implementation performances. During this process, a total of 39 block ciphers were extracted from 36 papers. The primary studies were reviewed considering the block cipher structures, while the implementation performances were classified according to the encryption throughput and memory utilization. The review results showed that the performance may depend on the clock frequency where low clock frequency might cause a bottleneck in some implementations even though the algorithm was designed using fast mathematical operations. Moreover, it is observed that Feistel structures mostly resulted in average and consistent implementation performances, whereas the block ciphers having Substitution and Permutation Layer (SPN) structure had a wide range of implementation performance results. As another result of this study, memory efficiency is shown as inversely proportional to the throughput in many software implementations. Additionally, some block ciphers having a high-performance software implementation might be able to replace the hardware implementations due to the convenience of the software platforms in many applications.","PeriodicalId":348371,"journal":{"name":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 7th International Workshop on Big Data and Information Security (IWBIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWBIS56557.2022.9924700","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

One of the important milestones of information security, block ciphers, are symmetric-key encryption algorithms that encrypt fixed-length inputs. The main purpose of this research is to analyze software implementations of block ciphers using the research method of the systematic literature review (SLR) proposed in software engineering and analyze them based on their implementation performances. During this process, a total of 39 block ciphers were extracted from 36 papers. The primary studies were reviewed considering the block cipher structures, while the implementation performances were classified according to the encryption throughput and memory utilization. The review results showed that the performance may depend on the clock frequency where low clock frequency might cause a bottleneck in some implementations even though the algorithm was designed using fast mathematical operations. Moreover, it is observed that Feistel structures mostly resulted in average and consistent implementation performances, whereas the block ciphers having Substitution and Permutation Layer (SPN) structure had a wide range of implementation performance results. As another result of this study, memory efficiency is shown as inversely proportional to the throughput in many software implementations. Additionally, some block ciphers having a high-performance software implementation might be able to replace the hardware implementations due to the convenience of the software platforms in many applications.
分组密码的软件实现性能:系统的文献综述
分组密码是信息安全的重要里程碑之一,它是对固定长度输入进行加密的对称密钥加密算法。本研究的主要目的是利用软件工程中提出的系统文献综述(SLR)的研究方法对分组密码的软件实现进行分析,并根据其实现性能进行分析。在此过程中,共从36篇论文中提取了39个分组密码。综述了基于分组密码结构的初步研究,并根据加密吞吐量和内存利用率对实现性能进行了分类。审查结果表明,性能可能取决于时钟频率,低时钟频率可能会导致瓶颈在某些实现中,即使该算法是使用快速的数学运算设计的。此外,观察到Feistel结构的实现性能大多是平均和一致的,而具有替换和排列层(SPN)结构的分组密码的实现性能结果范围很广。本研究的另一个结果是,在许多软件实现中,内存效率显示为与吞吐量成反比。此外,由于软件平台在许多应用程序中的便利性,一些具有高性能软件实现的分组密码可能能够取代硬件实现。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信