skip to main content
10.1145/329166.329176acmconferencesArticle/Chapter ViewAbstractPublication PagesfpgaConference Proceedingsconference-collections
Article
Free Access

An FPGA implementation and performance evaluation of the Serpent block cipher

Authors Info & Claims
Published:01 February 2000Publication History

ABSTRACT

With the expiration of the Data Encryption Standard (DES) in 1998, the Advanced Eneryption Standard (AES) development process is well underway. It is hoped that the result of the AES process will be the specification of a new non-classified encryption algorithm that will have the global acceptance achieved by DES as well as the capability of long-term protection of sensitive information. The technical analysis used in determining which of the potential AES candidates will be selected as the Advanced Encryption Algorithm includes efficiency testing of both hardware and software implementations of candidate algorithms. Reprogrammable devices such as Field Programmable Gate Arrays (FPGAs) are highly attractive options for hardware implementations of encryption algorithms as they provide cryptographic algorithm agility, physical security, and potentially much higher performance than software solutions. This contribution investigates the significance of an FPGA implementation of Serpent, one of the Advanced Encryption Standard candidate algorithms. Multiple architecture options of the Serpent algorithm will be explored with a strong focus being placed on a high speed implementation within an FPGA in order to support security for current and future high bandwidth applications. One of the main findings is that Serpent can be implemented with encryption rates beyond 4 Gbit/s on current FPGAs.

References

  1. 1.D. Stinson, Cryptography, Theory and Practice. Boca Raton, FL: CRC Press, 1995.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.National Institute of Standards and Technology (NIST), First Advanced Eneryption Standard (AES) Conference, (Ventura, CA), 1998.]]Google ScholarGoogle Scholar
  3. 3.National Institute of Standards and Technology (NIST), Second Advanced Encryption Standard (AES) Conference, (Rome, Italy), March 1999.]]Google ScholarGoogle Scholar
  4. 4.B. Schneier, Applied Cryptography. John Wiley & Sons Inc., 2nd ed., 1995.]]Google ScholarGoogle Scholar
  5. 5.R. Doud, "Hardware Crypto Solutions Boost VPN," Electronic Engineering Times, pp. 57-64, April 1999.]]Google ScholarGoogle Scholar
  6. 6.B. Gladman, "Implementation Experience with AES Candidate Algorithms," in Proceedings: Second AES Candidate Conference (AES2), (Rome, Italy), March 1999.]]Google ScholarGoogle Scholar
  7. 7.J. Kaps and C. Paar, "Fast DES Implementations for FPGAs and its Application to a Universal Key-Search Machine," in 5th Annual Workshop on Selected Areas in Cryptography (SAC '98) (S. Tavares and H. Meijer, eds.), vol. LNCS 1556, (Queen's University, Kingston, Ontario, Canada), Springer-Verlag, August 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.E. Biham, "A Fast New DES Implementation in Software," Technical Report, Computer Science Department, Technion - Israel Institute of Technology, Haifa, Israel, 1997.]]Google ScholarGoogle Scholar
  9. 9.A. Pfitzmann and R. Assman, "More Efficient Software Implementations of (Generalized) DES," Computers Security, vol. 12, no. 5, pp. 477-500, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.J. Hughes, "Implementation of NBS/DES Encryption Algorithm in Software," in Colloquium on Techniques and Implications of Digital Privacy and Authentication Systems, 1981.]]Google ScholarGoogle Scholar
  11. 11.D. Runje and M. Kovac, "Universal Strong Encryption FPGA Core Implementation," in Proceedings of Design, Automation, and Test in Europe, (Paris, France), pp. 923-924, February 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.O. Mencer, M. Morf, and M. Flynn, "Hardware Software Tri-Design of Encryption for Mobile Communication Units," in Proceedings of International Conference on Acoustics, Speech, and Signal Processing, (Seattle, WA), May 1998.]]Google ScholarGoogle Scholar
  13. 13.M. Riaz and H. Heys, "The FPGA Implementation of RC6 and CAST-256 Encryption Algorithms," in Proceedings of IEEE Canadian Conference on Electrical and Computer Engineering CCECE'99, (Edmonton, Alberta, Canada), May 1999.]]Google ScholarGoogle Scholar
  14. 14.A. Elbirt, "An FPGA Implementation and Performance Evaluation of the CAST-256 Block Cipher," Technical Report, Cryptography and Information Security Group, Electrical and Computer Engineering Department, Worcester Polytechnic Institute, Worcester, MA, May 1999.]]Google ScholarGoogle Scholar
  15. 15.R. Anderson, E. Biham, and L. Knudsen, "Serpent: A Proposal for the Advanced Encryption Standard," in First Advanced Encryption Standard (AES) Conference, (Ventura, CA), 1998.]]Google ScholarGoogle Scholar
  16. 16.H. Feistel, "Cryptography and Computer Privacy," Scientific American, no. 228, pp. 15-23, 1973.]]Google ScholarGoogle ScholarCross RefCross Ref
  17. 17.B. Schneier and J. Kelsey, "Unbalanced Feistel Networks and Block Cipher Design," in International Workshop on Fast Software Encryption (D. Gollmann, ed.), vol. LNCS 1039, (Cambridge, UK), Springer- Verlag, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.A. Elbirt and C. Poor, "Towards an FPGA Architecture Optimized for Public-Key Algorithms," in The SPIE's Symposium on Voice, Video, and Data Communications, (Boston, MA), September 19-22 1999.]]Google ScholarGoogle Scholar
  19. 19.Xilinx Inc., Virtex 2.5V Field Programmable Gate Arrays, 1998.]]Google ScholarGoogle Scholar
  20. 20.D. Wilcox, L. Pierson, P. Robertson, E. Witzke, and K. Gass, "A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond," in Workshop on Cryptographic Hardware and Embedded Systems - CHES '99 (C. KoC and C. Poor, eds.), vol. LNCS 1717, (Worcester, MA), Springer-Verlag, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An FPGA implementation and performance evaluation of the Serpent block cipher

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        FPGA '00: Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field programmable gate arrays
        February 2000
        223 pages
        ISBN:1581131933
        DOI:10.1145/329166

        Copyright © 2000 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 February 2000

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate125of627submissions,20%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader