一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

面向密碼算法的大位寬比特置換操作高速實(shí)現(xiàn)方案

戴紫彬 馬超 李偉 南龍梅

戴紫彬, 馬超, 李偉, 南龍梅. 面向密碼算法的大位寬比特置換操作高速實(shí)現(xiàn)方案[J]. 電子與信息學(xué)報(bào), 2017, 39(9): 2119-2126. doi: 10.11999/JEIT161285
引用本文: 戴紫彬, 馬超, 李偉, 南龍梅. 面向密碼算法的大位寬比特置換操作高速實(shí)現(xiàn)方案[J]. 電子與信息學(xué)報(bào), 2017, 39(9): 2119-2126. doi: 10.11999/JEIT161285
DAI Zibin, MA Chao, LI Wei, NAN Longmei. Wide-width Bit Permutation Instructions for Accelerating Cryptographic Algorithms[J]. Journal of Electronics & Information Technology, 2017, 39(9): 2119-2126. doi: 10.11999/JEIT161285
Citation: DAI Zibin, MA Chao, LI Wei, NAN Longmei. Wide-width Bit Permutation Instructions for Accelerating Cryptographic Algorithms[J]. Journal of Electronics & Information Technology, 2017, 39(9): 2119-2126. doi: 10.11999/JEIT161285

面向密碼算法的大位寬比特置換操作高速實(shí)現(xiàn)方案

doi: 10.11999/JEIT161285
基金項(xiàng)目: 

國(guó)家自然科學(xué)基金(61404175)

Wide-width Bit Permutation Instructions for Accelerating Cryptographic Algorithms

Funds: 

The National Natural Science Foundation of China (61404175)

  • 摘要: 針對(duì)面向字級(jí)優(yōu)化的通用處理器,在應(yīng)對(duì)密碼算法中大位寬比特置換操作時(shí)效率較低的問題,該文提出2N-2N和kN-kN(k2)的大位寬比特置換操作高速實(shí)現(xiàn)方案。并針對(duì)方案中涉及的比特提取和比特提取-移位兩種操作,分別提出專用擴(kuò)展指令BEX, BEX-ROT。在此基礎(chǔ)上,對(duì)專用指令硬件架構(gòu)的高效設(shè)計(jì)進(jìn)行研究,提出一種基于Inverse Butterfly網(wǎng)絡(luò)統(tǒng)一硬件架構(gòu)-RERS(Reconfigurable Extract and Rotation Shifter)及相應(yīng)可重構(gòu)路由算法,以最大限度地共享硬件資源,減小電路面積。實(shí)驗(yàn)結(jié)果表明,所提方案能夠?qū)⑻幚砥骷軜?gòu)執(zhí)行大位寬比特置換操作的指令條數(shù)縮減約10倍,大幅提升其處理效率。同時(shí),由專用指令所帶來的硬件資源開銷和延遲開銷均較低,不會(huì)影響到原架構(gòu)正常工作頻率。
  • AO T, HE Z, and DAI K. Low-cost bit permutation circuit with concise configuration rule[C]. Proceedings of the International MultiConference of Engineers and Computer Scientists, Hong Kong, 2015: 158-160.
    SHAN Weiwei, CHEN Xin, LU Yinchao, et al. A novel combinatorics-based reconfigurable bit permutation network and its circuit implementation[J]. Chinese Journal of Electronics, 2015, 24(3): 513-517. doi: 10.1049/cje.2015.07. 013.
    JOLFAEI A, WU X, and MUTHUKKUMARASAMY V. On the security of permutation-only image encryption schemes[J]. IEEE Transactions on Information Forensics and Security, 2015, 11(2): 235-246. doi: 10.1109/TIFS.2015.2489178.
    LI W, YU F, and MA Z. Efficient circuit for parallel bit reversal[J]. IEEE Transactions on Circuits Systems II Express Briefs, 2016, 63(4): 381-385. doi: 10.1109/TCSII. 2015.2504943.
    RAVAL N, BANSOD G, PISHAROTY D N, et al. Implementation of efficient bit permutation box for embedded security[J]. WSEAS Transactions on Computers, 2014(13): 442-451.
    BANSOD G, GUPTA A, GHOSH A, et al. Experimental analysis and implementation of bit level permutation instructions for embedded security[J]. WSEAS Transactions on Information Science Applications, 2013, 10(9): 303-312.
    SHIBUTANI K, ISOBE T, HIWATARI H, et al. PICCOLO: An ultra-lightweight blockcipher[C]. Cryptographic Hardware and Embedded Systems-CHES 2011, Nara, 2011: 342-357. doi: 10.1007/978-3-642-23951-9_23.
    BOGDANOV A, KNUDSEN L R, LEANDER G, et al. PRESENT: An ultra-lightweight block cipher[J]. Lecture Notes in Computer Science, 2007, 4727: 450-466. doi: 10.1007 /978-3-540-74735-2_31.
    MINIER M and GILBERT H. Stochastic cryptanalysis of crypton[C]. FAST Software Encryption, International WorkShop, FSE 2000, New York, 2000: 121-133. doi: 10.1007 /3-540-44706-7_9.
    BIHAM E, ANDERSON R, and KNUDSEN L. SERPENT: a new block cipher proposal[J]. Lecture Notes in Computer Science, 1998, 1372: 222-238. doi: 10.1007/3-540-69710- 1_15.
    CHENG H, HEYS H M, and WANG C. PUFFIN: A novel compact block cipher targeted to embedded digital systems[C]. Euromicro Conference on Digital System Design Architectures Methods and Tools, Parma, 2008: 383-390. doi: 10.1109/DSD.2008.34.
    HILEWITZ Y and LEE R B. Fast bit gather, bit scatter and bit permutation instructions for commodity microprocessors [J]. Journal of Signal Processing Systems, 2008, 53(1):145-169. doi: 10.1007/s11265-008-0212-8.
    KOLAY S, KHURANA S, SADHUKHAN A, et al. PERMS: A bit permutation instruction for accelerating software cryptography[C]. Euromicro Conference on Digital System Design, Los Alamitos, 2013: 963-968. doi: 10.1109/DSD.2013. 109.
    SANGEETHA M and JAGADEESWARI M. Design and implementation of new lightweight encryption technique[J]. International Journal of Innovative Research in Science Engineering and Technology, 2016, 5(3): 8610-8617.
    常忠祥, 戴紫彬, 李偉, 等. 基于互連網(wǎng)絡(luò)的比特置換實(shí)現(xiàn)技術(shù)[J]. 計(jì)算機(jī)工程與設(shè)計(jì), 2014(8): 2640-2644. doi: 10.3969/ j.issn.1000 -7024.2014.08.004.
    CHANG Zhongxiang, DAI Zibin, LI Wei, et al. Bit permutation based on interconnection network[J]. Computer Engineering and Design, 2014(8): 2640-2644. doi: 10.3969/ j.issn.1000-7024.2014.08.004.
    SHI Z J. Bit permutation instructions: Architecture, implementation, and cryptographic properties[D]. [Doctoral dissertation]. Princeton University, 2004.
    HILEWITZ Y and LEE R B. A new basis for shifters in general-purpose processors for existing and advanced bit manipulations[J]. IEEE Transactions on Computers, 2009, 58(8):1035-1048. doi: 10.1109/TC.2008.219.
    SAYILAR G and CHIOU D. CRYPTORAPTOR: High throughput reconfigurable cryptographic processor[C]. IEEE /ACM International Conference on Computer-Aided Design, San Jose, 2014: 155-161. doi: 10.1109/ICCAD.2014.7001346.
    BENHADJYOUSSEF N, ELHADJYOUSSEF W, MACHHOUT M, et al. Enhancing a 32-bit processor core with efficient cryptographic instructions[J]. Journal of Circuits, Systems Computers, 2015, 24(10): 1550158-1550178. doi: 10.1142/S0218126615501583.
    胡敏, 盧永江, 劉兵. 基于CK810處理器的匯編鏈接時(shí)優(yōu)化[J]. 計(jì)算機(jī)工程, 2014, 40(11): 250-254. doi: 10.3969/j.issn. 1000-3428.2014.11.050.
    HU Min, LU Yongjiang, and LIU Bing. Assembly and link time optimization based on CK810 processor[J]. Computer Engineering, 2014, 40(11): 250-254. doi: 10.3969/j.issn.1000- 3428.2014.11.050.
    LIU B and BAAS B M. Parallel AES encryption engines for many-core processor arrays[J]. IEEE Transactions on Computers, 2013, 62(3): 536-547. doi: 10.1109/TC.2011.251.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  1508
  • HTML全文瀏覽量:  210
  • PDF下載量:  259
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2016-11-25
  • 修回日期:  2017-06-05
  • 刊出日期:  2017-09-19

目錄

    /

    返回文章
    返回