Abstract

The Advanced Encryption Standard (AES) algorithm and Counter (CTR) mode are used for numerous services as an encryption technique that provides confidentiality. Even though the AES with counter (AES CTR) mode has an advantage in that it can process multiple data blocks in parallel, its implementation should also be observed to reduce the computational burden of current services.In this paper, we propose an implementation method called FACE that can improve the performance of the AES CTR mode. The proposed method is based on five caches of frequently occurring intermediate values, so that it reduces the number of unnecessary computations. Our method can be employed in any AES CTR implementation, regardless of the platform, environment, or implementation method. There are two known AES implementation techniques, namely, counter-mode caching and bitslicing. FACE extends counter-mode caching in order to optimize the previous result and to maximize the scope of caching. We show that FACE can be applied efficiently to various implementations (table-based, bitsliced, and AES-NI-based). In particular, this is the first attempt to combine our extended counter-mode caching with bitsliced implementations of AES, and is also the first to apply counter-mode caching up to the round transformations of AES-NI implementation. To prove the efficiency of our proposed method, we conduct a performance evaluation in various environments, which we then compare with the previous fastest results. Our bitsliced FACE needs 6.41 cycles/byte on an Intel Core 2, and AES-NI-based FACE records 0.44 cycles/byte on an Intel Core i7.

Highlights

  • The number of Internet users has increased rapidly with significant improvements in network technologies and services such as content delivery and VoIP have emerged in response to demand

  • FACE can be employed in any Advanced Encryption Standard (AES) CTR implementation, regardless of the platform, environment, or implementation method, as this technique can cover a round transformation entirely

  • We note that the vulnerabilities caused by timing attacks on FACE are dependent on the adopting implementation method because FACE can be employed in any AES with counter (AES CTR) implementation, regardless of implementation method

Read more

Summary

Introduction

The number of Internet users has increased rapidly with significant improvements in network technologies and services such as content delivery and VoIP have emerged in response to demand. Because these Internet services are commonly based on usage-pricing models, service providers should consider a way to protect their service assets from illegal usage. There are several technologies for protecting either assets or information, most of these are based on providing confidentiality for their contents. The above-mentioned issues can be resolved using a cryptographic algorithm (e.g., AES, DES) for data confidentiality. Adopting a cryptographic algorithm for current services is burdensome because it requires additional computational resources. IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925, Vol 2018, No 3, pp. 469–499 DOI:10.13154/tches.v2018.i3.469-499

Methods
Results
Discussion
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.