A High Throughput, Low Latency 105 Gbps Four-Pipeline Stage AES
DOI:
https://doi.org/10.54654/isj.v1i21.1029Keywords:
AES, hardware implementation, pipeline, on-the-flyTóm tắt
Abstract—The emergence of new technologies such as 6G, IoT, big data has heightened the significance of ensuring the security of high-throughput data. These technologies require even more high-performance encryption solutions to keep up with the increasing demands for secure and efficient data processing. This paper present a high-throughput, low latency 4-pipeline stages architecture of AES with efficient throughput per resource (Mbps/slice). The proposed implementation achieves a high throughput of 105.7 Gbps with an efficiency of 31.48 Mbps/slice. In comparison to state-of-the-art works, our design surpasses the majority of existing designs in terms of throughput and latency.
Downloads
References
. D'Ambrosia, John. "100 gigabit Ethernet and beyond [Commentary]." IEEE communications magazine 48.3 (2010): S6-S13.
. R. Doud, “Hardware crypto solutions Boost VPN,” Electron. Eng. Times, pp. 57–64, Apr. 12, 1999.
. Liu Q, Xu Z , Yuan Y. A 66.1 Gbps single-pipeline AES on FPGA. In: 2013 international conference on, field-programmable technology (FPT). IEEE; 2013, p. 378–81.
. Liu, Qiang, Zhenyu Xu, and Ye Yuan. "High throughput and secure advanced encryption standard on field programmable gate array with fine pipelining and enhanced key expansion." IET Computers & Digital Techniques 9.3 (2015): 175-184.
. Chaves R, Kuzmanov G, Vassiliadis S, Sousa L. Reconfigurable memory based AES coprocessor. In: 20th international parallel and distributed processing symposium IPDPS, IEEE; 2006. p. 8.
. Chodowiec P, Gaj K. Very compact FPGA implementation of the AES algorithm. In: Cryptographic hardware and embedded systems-CHES. Springer; 2003. p. 319–33.
. Bulens P, Standaert FX, Quisquater JJ, Pellegrin P, Rouvroy G. Implementation of the AES-128 on virtex-5 FPGAs. In: Progress in cryptology–AFRICACRYPT. Springer; 2008. p. 16–26.
. El Maraghy M, Hesham S, Abd El Ghany MA. Real-time efficient FPGA implementation of aes algorithm. In: 2013 IEEE 26th international, SOC conference (SOCC). IEEE; 2013. p. 203–8.
. Rahimunnisa, K., et al. "FPGA implementation of AES algorithm for high throughput using folded parallel architecture." Security and Communication Networks 7.11 (2014): 2225-2236.
. Soltani, Abolfazl, and Saeed Sharifian. "An ultra-high throughput and fully pipelined implementation of AES algorithm on FPGA." Microprocessors and Microsystems 39.7 (2015): 480-493.
. Kouzehzar, Hossein, Meisam Nesary Moghadam, and Pooya Torkzadeh. "A high data rate pipelined architecture of AES encryption/decryption in storage area networks." Electrical Engineering (ICEE), Iranian Conference on. IEEE, 2018.
. Shahbazi, Karim, and Seok‐Bum Ko. "High throughput and area‐efficient FPGA implementation of AES for high‐traffic applications." IET Computers & Digital Techniques 14.6 (2020): 344-352.
. Oukili, Soufiane, and Seddik Bri. "Hardware implementation of AES algorithm with logic S-box." Journal of Circuits, Systems and Computers 26.09 (2017): 1750141.
. Baby Chellam, Manjith, and Ramasubramanian Natarajan. "AES hardware accelerator on FPGA with improved throughput and resource efficiency." Arabian Journal for Science and Engineering 43 (2018): 6873-6890.
. Satoh A, Morioka S, Takano K, Munetoh S. A compact rijndael hardware architecture with S-box optimization. In: Boyd C, editor. Advances in cryptology ASIACRYPT 2001, vol. 2248., Lecture notes in computer science. Berlin, Heidelberg: Springer; 2001. p. 239–54.
. Canright D. A very compact S-box for AES. Springer; 2005.
. Pradeep, A., Mohanty, V., Subramaniam, A. M., & Rebeiro, C. (2019). Revisiting AES SBox composite field implementations for FPGAs. IEEE embedded systems letters, 11(3), 85-88.
. L. Henzen and W. Fichtner, “FPGA parallel-pipelined AES-GCM core for 100G Ethernet applications,” ESSCIRC 2010, 2010, pp. 202-205.
. Gaj, Kris, and Pawel Chodowiec. "FPGA and ASIC implementations of AES." Cryptographic engineering (2009): 235-294.
. Luong, T. T. (2022). Building the dynamic diffusion layer for SPN block ciphers based on direct exponent and scalar multiplication. Journal of Science and Technology on Information Security, 1(15), 38-45. https://doi.org/10.54654/isj.v1i15.836.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).