Pipeline Oriented Implementation of NORX for ARM Processors

  • Luan Cardoso dos Santos UNICAMP
  • Julio López UNICAMP

Resumo


NORX é uma família de algoritmos de cifração autenticada que participa da terceira fase do CAESAR, competição para esquemas de cifração autenticada. Nesse trabalho, investigamos o uso de optimizações de pipeline em plataformas ARM de forma a acelerar a execução do NORX. Também mostramos tempos da nossa implementação usando instruções NEON. Nossos resultados mostram melhoria de até 48% na velocidade de execução comparado com implementações estado-da-arte em processadores Cortex A ARMv8 e em processadores ARMv7.

Referências

J. Aumasson, P. Jovanovic, and S. Neves, “NORX v3.0,” https://norx.io/data/norx.pdf, Sep. 2016. [Online]. Available: https://norx.io/data/norx.pdf

C. CAESAR, “Competition for authenticated encryption: Security, applicability, and robustness,” http://competitions.cr.yp.to, Apr. 2013. [Online]. Available: http://competitions.cr.yp.to

M. J. Dworkin, “Recommendation for block cipher modes of operation: Galois/counter mode (gcm) and gmac,” Special Publication (NIST SP)-800-38D, 2007.

P. Rogaway, “Authenticated-encryption with associated-data,” in ACM Conference on Computer and Communications Security. ACM, 2002, pp. 98–107.

M. Videau, “estream,” in Encyclopedia of Cryptography and Security (2nd Ed.). Springer, 2011, pp. 426–427.

B. Preneel, “AHS competition/sha-3,” in Encyclopedia of Cryptography and Security (2nd Ed.). Springer, 2011, pp. 27–29.

G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “Duplexing the sponge: single-pass authenticated encryption and other applications,” IACR Cryptology ePrint Archive, vol. 2011, p. 499, 2011.

G. Bertoni, J. Daemen, M. Peeters, and G. Van Assche, “Sponge functions,” in ECRYPT hash workshop, vol. 2007. Citeseer, 2007.

G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, “On the indifferentiability of the sponge construction,” in EUROCRYPT, ser. Lecture Notes in Computer Science, vol. 4965. Springer, 2008, pp. 181–197.

J. Aumasson, P. Jovanovic, and S. Neves, “NORX: parallel and scalable AEAD,” in ESORICS (2), ser. Lecture Notes in Computer Science, vol. 8713. Springer, 2014, pp. 19–36.

D. J. Bernstein, “Chacha, a variant of salsa20,” in Workshop Record of SASC, vol. 8, 2008.

A. Biryukov and D. Khovratovich, “PAEQ: parallelizable permutation-based authenticated encryption,” in ISC, ser. Lecture Notes in Computer Science, vol. 8783. Springer, 2014, pp. 72–89.

A. Holdings, “Arm: Media fact sheet,” https://www.arm.com/-/media/arm-com/news/ARM-media-fact-sheet-2016.pdf?la=en, Sep. 2016. [Online]. Available: https://www.arm.com/-/media/arm-com/news/ARM-media-fact-sheet-2016.pdf?la=en

——, “Processors cortex-a,” http://www.arm.com/products/processors/cortex-a, Mar. 2017. [Online]. Available: http://www.arm.com/products/processors/cortex-a

J. Aumasson, P. Jovanovic, and S. Neves, “Norx reference implementations (software),” https://github.com/norx/norx, 2015.

D. J. Bernstein, “Supercop: System for unified performance evaluation related to cryptographic operations and primitives,” 2009.
Publicado
06/11/2017
Como Citar

Selecione um Formato
SANTOS, Luan Cardoso dos; LÓPEZ, Julio. Pipeline Oriented Implementation of NORX for ARM Processors. In: SIMPÓSIO BRASILEIRO DE SEGURANÇA DA INFORMAÇÃO E DE SISTEMAS COMPUTACIONAIS (SBSEG), 17. , 2017, Brasília. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2017 . p. 2-15. DOI: https://doi.org/10.5753/sbseg.2017.19486.