Pipeline Oriented Implementation of NORX for ARM Processors
Resumo
NORX é uma família de algoritmos de cifração autenticada que participa da terceira fase do CAESAR, competição para esquemas de cifração autenticada. Nesse trabalho, investigamos o uso de optimizações de pipeline em plataformas ARM de forma a acelerar a execução do NORX. Também mostramos tempos da nossa implementação usando instruções NEON. Nossos resultados mostram melhoria de até 48% na velocidade de execução comparado com implementações estado-da-arte em processadores Cortex A ARMv8 e em processadores ARMv7.
Referências
C. CAESAR, “Competition for authenticated encryption: Security, applicability, and robustness,” http://competitions.cr.yp.to, Apr. 2013. [Online]. Available: http://competitions.cr.yp.to
M. J. Dworkin, “Recommendation for block cipher modes of operation: Galois/counter mode (gcm) and gmac,” Special Publication (NIST SP)-800-38D, 2007.
P. Rogaway, “Authenticated-encryption with associated-data,” in ACM Conference on Computer and Communications Security. ACM, 2002, pp. 98–107.
M. Videau, “estream,” in Encyclopedia of Cryptography and Security (2nd Ed.). Springer, 2011, pp. 426–427.
B. Preneel, “AHS competition/sha-3,” in Encyclopedia of Cryptography and Security (2nd Ed.). Springer, 2011, pp. 27–29.
G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “Duplexing the sponge: single-pass authenticated encryption and other applications,” IACR Cryptology ePrint Archive, vol. 2011, p. 499, 2011.
G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, “Sponge functions,” in ECRYPT hash workshop, vol. 2007. Citeseer, 2007.
G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “On the indifferentiability of the sponge construction,” in EUROCRYPT, ser. Lecture Notes in Computer Science, vol. 4965. Springer, 2008, pp. 181–197.
J. Aumasson, P. Jovanovic, and S. Neves, “NORX: parallel and scalable AEAD,” in ESORICS (2), ser. Lecture Notes in Computer Science, vol. 8713. Springer, 2014, pp. 19–36.
D. J. Bernstein, “Chacha, a variant of salsa20,” in Workshop Record of SASC, vol. 8, 2008.
A. Biryukov and D. Khovratovich, “PAEQ: parallelizable permutation-based authenticated encryption,” in ISC, ser. Lecture Notes in Computer Science, vol. 8783. Springer, 2014, pp. 72–89.
A. Holdings, “Arm: Media fact sheet,” https://www.arm.com/-/media/arm-com/news/ARM-media-fact-sheet-2016.pdf?la=en, Sep. 2016. [Online]. Available: https://www.arm.com/-/media/arm-com/news/ARM-media-fact-sheet-2016.pdf?la=en
——, “Processors cortex-a,” http://www.arm.com/products/processors/cortex-a, Mar. 2017. [Online]. Available: http://www.arm.com/products/processors/cortex-a
J. Aumasson, P. Jovanovic, and S. Neves, “Norx reference implementations (software),” https://github.com/norx/norx, 2015.
D. J. Bernstein, “Supercop: System for unified performance evaluation related to cryptographic operations and primitives,” 2009.