Pipeline Oriented Implementation of NORX for ARM Processors
Abstract
NORX is a family of authenticated encryption algorithms that advanced to the third-round of the ongoing CAESAR competition for authenticated encryption schemes. In this work, we investigate the use of pipeline optimizations on ARM platforms to accelerate the execution of NORX. We also provide benchmarks of our implementation using NEON instructions. The results of our implementation show a speed improvement up to 48% compared to the state-of-art implementation on Cortex-A ARMv8 and ARMv7 processors.
References
C. CAESAR, “Competition for authenticated encryption: Security, applicability, and robustness,” http://competitions.cr.yp.to, Apr. 2013. [Online]. Available: http://competitions.cr.yp.to
M. J. Dworkin, “Recommendation for block cipher modes of operation: Galois/counter mode (gcm) and gmac,” Special Publication (NIST SP)-800-38D, 2007.
P. Rogaway, “Authenticated-encryption with associated-data,” in ACM Conference on Computer and Communications Security. ACM, 2002, pp. 98–107.
M. Videau, “estream,” in Encyclopedia of Cryptography and Security (2nd Ed.). Springer, 2011, pp. 426–427.
B. Preneel, “AHS competition/sha-3,” in Encyclopedia of Cryptography and Security (2nd Ed.). Springer, 2011, pp. 27–29.
G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “Duplexing the sponge: single-pass authenticated encryption and other applications,” IACR Cryptology ePrint Archive, vol. 2011, p. 499, 2011.
G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, “Sponge functions,” in ECRYPT hash workshop, vol. 2007. Citeseer, 2007.
G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “On the indifferentiability of the sponge construction,” in EUROCRYPT, ser. Lecture Notes in Computer Science, vol. 4965. Springer, 2008, pp. 181–197.
J. Aumasson, P. Jovanovic, and S. Neves, “NORX: parallel and scalable AEAD,” in ESORICS (2), ser. Lecture Notes in Computer Science, vol. 8713. Springer, 2014, pp. 19–36.
D. J. Bernstein, “Chacha, a variant of salsa20,” in Workshop Record of SASC, vol. 8, 2008.
A. Biryukov and D. Khovratovich, “PAEQ: parallelizable permutation-based authenticated encryption,” in ISC, ser. Lecture Notes in Computer Science, vol. 8783. Springer, 2014, pp. 72–89.
A. Holdings, “Arm: Media fact sheet,” https://www.arm.com/-/media/arm-com/news/ARM-media-fact-sheet-2016.pdf?la=en, Sep. 2016. [Online]. Available: https://www.arm.com/-/media/arm-com/news/ARM-media-fact-sheet-2016.pdf?la=en
——, “Processors cortex-a,” http://www.arm.com/products/processors/cortex-a, Mar. 2017. [Online]. Available: http://www.arm.com/products/processors/cortex-a
J. Aumasson, P. Jovanovic, and S. Neves, “Norx reference implementations (software),” https://github.com/norx/norx, 2015.
D. J. Bernstein, “Supercop: System for unified performance evaluation related to cryptographic operations and primitives,” 2009.
