An Architecture for the AES-GCM Security Standard

The forth recommendation of symmetric block cipher mode of operation SP800-38D, <em>Galois/Counter Mode of Operation</em> (GCM) was developed by David A McGrew and John Viega. GCM uses an approved symmetric key block cipher with a block size of 128 bits and a universal hashing over a b...

Full description

Bibliographic Details
Main Author: Wang, Sheng
Format: Others
Language:en
Published: University of Waterloo 2007
Subjects:
AES
GCM
Online Access:http://hdl.handle.net/10012/2885
id ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-2885
record_format oai_dc
spelling ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-28852013-01-08T18:50:04ZWang, Sheng2007-05-08T13:50:07Z2007-05-08T13:50:07Z20062006http://hdl.handle.net/10012/2885The forth recommendation of symmetric block cipher mode of operation SP800-38D, <em>Galois/Counter Mode of Operation</em> (GCM) was developed by David A McGrew and John Viega. GCM uses an approved symmetric key block cipher with a block size of 128 bits and a universal hashing over a binary Galois field to provide confidentiality and authentication. It is built specifically to support very high data rates as it can take advantage of pipelining and parallel processing techniques. <br /><br /> Before GCM, SP800-38A only provided confidentiality and SP800-38B provided authentication. SP800-38C provided confidentiality using the counter mode and authentication. However the authentication technique in SP800-38C was not parallelizable and slowed down the throughput of the cipher. Hence, none of these three recommendations were suitable for high speed network and computer system applications. <br /><br /> With the advent of GCM, authenticated encryption at data rates of several Gbps is now practical, permitting high grade encryption and authentication on systems which previously could not be fully protected. However there have not yet been any published results on actual architectures for this standard based on FPGA technology. <br /><br /> This thesis presents a fully pipelined and parallelized hardware architecture for AES-GCM which is GCM running under symmetric block cipher AES on a FPGA multi-core platform corresponding to the IPsec ESP data flow. <br /><br /> The results from this thesis show that the round transformations of confidentiality and hash operations of authentication in AES-GCM can cooperate very efficiently within this pipelined architecture. Furthermore, this AES-GCM hardware architecture never unnecessarily stalls data pipelines. For the first time this thesis provides a complete FPGA-based high speed architecture for the AES-GCM standard, suitable for high speed embedded applications.application/pdf985899 bytesapplication/pdfenUniversity of WaterlooCopyright: 2006, Wang, Sheng. All rights reserved.Electrical & Computer EngineeringAESGCMSecurityArchitectureFPGAAn Architecture for the AES-GCM Security StandardThesis or DissertationElectrical and Computer EngineeringMaster of Applied Science
collection NDLTD
language en
format Others
sources NDLTD
topic Electrical & Computer Engineering
AES
GCM
Security
Architecture
FPGA
spellingShingle Electrical & Computer Engineering
AES
GCM
Security
Architecture
FPGA
Wang, Sheng
An Architecture for the AES-GCM Security Standard
description The forth recommendation of symmetric block cipher mode of operation SP800-38D, <em>Galois/Counter Mode of Operation</em> (GCM) was developed by David A McGrew and John Viega. GCM uses an approved symmetric key block cipher with a block size of 128 bits and a universal hashing over a binary Galois field to provide confidentiality and authentication. It is built specifically to support very high data rates as it can take advantage of pipelining and parallel processing techniques. <br /><br /> Before GCM, SP800-38A only provided confidentiality and SP800-38B provided authentication. SP800-38C provided confidentiality using the counter mode and authentication. However the authentication technique in SP800-38C was not parallelizable and slowed down the throughput of the cipher. Hence, none of these three recommendations were suitable for high speed network and computer system applications. <br /><br /> With the advent of GCM, authenticated encryption at data rates of several Gbps is now practical, permitting high grade encryption and authentication on systems which previously could not be fully protected. However there have not yet been any published results on actual architectures for this standard based on FPGA technology. <br /><br /> This thesis presents a fully pipelined and parallelized hardware architecture for AES-GCM which is GCM running under symmetric block cipher AES on a FPGA multi-core platform corresponding to the IPsec ESP data flow. <br /><br /> The results from this thesis show that the round transformations of confidentiality and hash operations of authentication in AES-GCM can cooperate very efficiently within this pipelined architecture. Furthermore, this AES-GCM hardware architecture never unnecessarily stalls data pipelines. For the first time this thesis provides a complete FPGA-based high speed architecture for the AES-GCM standard, suitable for high speed embedded applications.
author Wang, Sheng
author_facet Wang, Sheng
author_sort Wang, Sheng
title An Architecture for the AES-GCM Security Standard
title_short An Architecture for the AES-GCM Security Standard
title_full An Architecture for the AES-GCM Security Standard
title_fullStr An Architecture for the AES-GCM Security Standard
title_full_unstemmed An Architecture for the AES-GCM Security Standard
title_sort architecture for the aes-gcm security standard
publisher University of Waterloo
publishDate 2007
url http://hdl.handle.net/10012/2885
work_keys_str_mv AT wangsheng anarchitecturefortheaesgcmsecuritystandard
AT wangsheng architecturefortheaesgcmsecuritystandard
_version_ 1716572877456670720