Modeling and simulation of common primitive operations used in block ciphers

P. R. Samala, H. Vakilzadian, D. Möller
{"title":"Modeling and simulation of common primitive operations used in block ciphers","authors":"P. R. Samala, H. Vakilzadian, D. Möller","doi":"10.1145/1357910.1358023","DOIUrl":null,"url":null,"abstract":"Secure transmission of information is of interest to both public and private sectors. This is especially important with today's increased use of the internet for e-commerce. This research has been motivated by the need for high speed encryption algorithms for the applications that are independent of a particular algorithm and security standards. \n \nIn this paper, hardware modeling and simulation of the common primitive operations used by the block ciphers are presented. The primitive operations were selected from the five finalist algorithms of the Advanced Encryption Standard (AES [1]) contest. These algorithms are promising for the selection of the new Encryption Standard, which was to replace the Data Encryption Standard (DES). As Field Programmable Gate Arrays (FPGAs) offer high flexibility and a low cost alternative for implementing these algorithms in Application-Specific Integrated Circuits (ASIC), these primitive operations are implemented in an Altera FPGA to permit user-programmable alternatives for a different encryption/decryption algorithm as opposed to a preselected one by a manufacturer. The results of implementing the Rijndael algorithm using these primitive operations also are presented.","PeriodicalId":91410,"journal":{"name":"Summer Computer Simulation Conference : (SCSC 2014) : 2014 Summer Simulation Multi-Conference : Monterey, California, USA, 6-10 July 2014. Summer Computer Simulation Conference (2014 : Monterey, Calif.)","volume":"35 1","pages":"732-737"},"PeriodicalIF":0.0000,"publicationDate":"2007-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Summer Computer Simulation Conference : (SCSC 2014) : 2014 Summer Simulation Multi-Conference : Monterey, California, USA, 6-10 July 2014. Summer Computer Simulation Conference (2014 : Monterey, Calif.)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1357910.1358023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Secure transmission of information is of interest to both public and private sectors. This is especially important with today's increased use of the internet for e-commerce. This research has been motivated by the need for high speed encryption algorithms for the applications that are independent of a particular algorithm and security standards. In this paper, hardware modeling and simulation of the common primitive operations used by the block ciphers are presented. The primitive operations were selected from the five finalist algorithms of the Advanced Encryption Standard (AES [1]) contest. These algorithms are promising for the selection of the new Encryption Standard, which was to replace the Data Encryption Standard (DES). As Field Programmable Gate Arrays (FPGAs) offer high flexibility and a low cost alternative for implementing these algorithms in Application-Specific Integrated Circuits (ASIC), these primitive operations are implemented in an Altera FPGA to permit user-programmable alternatives for a different encryption/decryption algorithm as opposed to a preselected one by a manufacturer. The results of implementing the Rijndael algorithm using these primitive operations also are presented.
分组密码中常用基本操作的建模和仿真
信息的安全传输是公共和私营部门都感兴趣的问题。这在当今越来越多地使用互联网进行电子商务的情况下尤为重要。这项研究的动机是对独立于特定算法和安全标准的应用程序的高速加密算法的需求。本文对分组密码常用的基本操作进行了硬件建模和仿真。原始操作是从高级加密标准(AES[1])竞赛的五个最终入围算法中选出的。这些算法对替代数据加密标准DES的新加密标准的选择具有重要意义。由于现场可编程门阵列(FPGA)为在专用集成电路(ASIC)中实现这些算法提供了高灵活性和低成本的替代方案,因此这些基本操作在Altera FPGA中实现,以允许用户可编程替代不同的加密/解密算法,而不是由制造商预先选择的算法。文中还给出了使用这些基本运算实现Rijndael算法的结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信