Pipeline Oriented Implementation of NORX for ARM Processors

  • Luan Cardoso dos Santos UNICAMP
  • Julio López UNICAMP

Abstract


NORX is a family of authenticated encryption algorithms that advanced to the third-round of the ongoing CAESAR competition for authenticated encryption schemes. In this work, we investigate the use of pipeline optimizations on ARM platforms to accelerate the execution of NORX. We also provide benchmarks of our implementation using NEON instructions. The results of our implementation show a speed improvement up to 48% compared to the state-of-art implementation on Cortex-A ARMv8 and ARMv7 processors.

References

J. Aumasson, P. Jovanovic, and S. Neves, “NORX v3.0,” https://norx.io/data/norx.pdf, Sep. 2016. [Online]. Available: https://norx.io/data/norx.pdf

C. CAESAR, “Competition for authenticated encryption: Security, applicability, and robustness,” http://competitions.cr.yp.to, Apr. 2013. [Online]. Available: http://competitions.cr.yp.to

M. J. Dworkin, “Recommendation for block cipher modes of operation: Galois/counter mode (gcm) and gmac,” Special Publication (NIST SP)-800-38D, 2007.

P. Rogaway, “Authenticated-encryption with associated-data,” in ACM Conference on Computer and Communications Security. ACM, 2002, pp. 98–107.

M. Videau, “estream,” in Encyclopedia of Cryptography and Security (2nd Ed.). Springer, 2011, pp. 426–427.

B. Preneel, “AHS competition/sha-3,” in Encyclopedia of Cryptography and Security (2nd Ed.). Springer, 2011, pp. 27–29.

G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “Duplexing the sponge: single-pass authenticated encryption and other applications,” IACR Cryptology ePrint Archive, vol. 2011, p. 499, 2011.

G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, “Sponge functions,” in ECRYPT hash workshop, vol. 2007. Citeseer, 2007.

G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “On the indifferentiability of the sponge construction,” in EUROCRYPT, ser. Lecture Notes in Computer Science, vol. 4965. Springer, 2008, pp. 181–197.

J. Aumasson, P. Jovanovic, and S. Neves, “NORX: parallel and scalable AEAD,” in ESORICS (2), ser. Lecture Notes in Computer Science, vol. 8713. Springer, 2014, pp. 19–36.

D. J. Bernstein, “Chacha, a variant of salsa20,” in Workshop Record of SASC, vol. 8, 2008.

A. Biryukov and D. Khovratovich, “PAEQ: parallelizable permutation-based authenticated encryption,” in ISC, ser. Lecture Notes in Computer Science, vol. 8783. Springer, 2014, pp. 72–89.

A. Holdings, “Arm: Media fact sheet,” https://www.arm.com/-/media/arm-com/news/ARM-media-fact-sheet-2016.pdf?la=en, Sep. 2016. [Online]. Available: https://www.arm.com/-/media/arm-com/news/ARM-media-fact-sheet-2016.pdf?la=en

——, “Processors cortex-a,” http://www.arm.com/products/processors/cortex-a, Mar. 2017. [Online]. Available: http://www.arm.com/products/processors/cortex-a

J. Aumasson, P. Jovanovic, and S. Neves, “Norx reference implementations (software),” https://github.com/norx/norx, 2015.

D. J. Bernstein, “Supercop: System for unified performance evaluation related to cryptographic operations and primitives,” 2009.
Published
2017-11-06
SANTOS, Luan Cardoso dos; LÓPEZ, Julio. Pipeline Oriented Implementation of NORX for ARM Processors. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 17. , 2017, Brasília. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2017 . p. 2-15. DOI: https://doi.org/10.5753/sbseg.2017.19486.

Most read articles by the same author(s)

1 2 > >>