View : 406 Download: 0
Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading
- Title
- Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading
- Authors
- Choi, P.; Kong, W.; Kim, J-H; Lee, M-K; Kim, Dong Kyue
- Ewha Authors
- 김지훈
- SCOPUS Author ID
- 김지훈
- Issue Date
- 2022
- Journal Title
- IEEE TRANSACTIONS ON COMPUTERS
- ISSN
- 0018-9340
1557-9956
- Citation
- IEEE TRANSACTIONS ON COMPUTERS vol. 71, no. 11, pp. 2844 - 2857
- Keywords
- Ciphers; Central Processing Unit; Software; Encryption; Hardware; Software algorithms; Convolution; Data encryption; microcomputers; physical security; processor architectures; support for security
- Publisher
- IEEE COMPUTER SOC
- Indexed
- SCIE; SCOPUS
- Document Type
- Article
- Abstract
- We propose a novel computer architectural concept of instruction overloading to support block ciphers. Instead of adding new instructions, we extend only the execution of some existing instructions. The proposed method allows a central processing unit core to execute different operations for the same instructions, depending on the address of the data, similar to operator overloading in object-oriented languages. We first present an extension for the AES algorithm, then we demonstrate its enhanced applicability with two further extensions supporting multiple block ciphers and hardware masking. The first extension for AES is also applicable to add/AND-rotate-XOR-based block ciphers such as SIMON. The AES and SIMON encryption speed, on this extended core, is at least doubled and is significantly less affected by memory latency. In addition, the AES encryption code requires only 18% of the memory of the previous software implementation. The second extension can further support various block ciphers defined over GF(2(8)), and the SM4 encryption speed is increased by at least 182%. The third extension provides correlation power analysis (CPA) resistance with a 66.6% area overhead but almost no speed overhead, whereas a typical software anti-CPA AES implementation requires at least hundreds of times the execution time.
- DOI
- 10.1109/TC.2021.3050515
- Appears in Collections:
- 공과대학 > 전자전기공학전공 > Journal papers
- Files in This Item:
There are no files associated with this item.
- Export
- RIS (EndNote)
- XLS (Excel)
- XML