An Architecture for the AES-GCM Security Standard
The forth recommendation of symmetric block cipher mode of operation SP800-38D, <em>Galois/Counter Mode of Operation</em> (GCM) was developed by David A McGrew and John Viega. GCM uses an approved symmetric key block cipher with a block size of 128 bits and a universal hashing over a b...
Main Author: | |
---|---|
Format: | Others |
Language: | en |
Published: |
University of Waterloo
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/10012/2885 |
id |
ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-2885 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-WATERLOO-oai-uwspace.uwaterloo.ca-10012-28852013-01-08T18:50:04ZWang, Sheng2007-05-08T13:50:07Z2007-05-08T13:50:07Z20062006http://hdl.handle.net/10012/2885The forth recommendation of symmetric block cipher mode of operation SP800-38D, <em>Galois/Counter Mode of Operation</em> (GCM) was developed by David A McGrew and John Viega. GCM uses an approved symmetric key block cipher with a block size of 128 bits and a universal hashing over a binary Galois field to provide confidentiality and authentication. It is built specifically to support very high data rates as it can take advantage of pipelining and parallel processing techniques. <br /><br /> Before GCM, SP800-38A only provided confidentiality and SP800-38B provided authentication. SP800-38C provided confidentiality using the counter mode and authentication. However the authentication technique in SP800-38C was not parallelizable and slowed down the throughput of the cipher. Hence, none of these three recommendations were suitable for high speed network and computer system applications. <br /><br /> With the advent of GCM, authenticated encryption at data rates of several Gbps is now practical, permitting high grade encryption and authentication on systems which previously could not be fully protected. However there have not yet been any published results on actual architectures for this standard based on FPGA technology. <br /><br /> This thesis presents a fully pipelined and parallelized hardware architecture for AES-GCM which is GCM running under symmetric block cipher AES on a FPGA multi-core platform corresponding to the IPsec ESP data flow. <br /><br /> The results from this thesis show that the round transformations of confidentiality and hash operations of authentication in AES-GCM can cooperate very efficiently within this pipelined architecture. Furthermore, this AES-GCM hardware architecture never unnecessarily stalls data pipelines. For the first time this thesis provides a complete FPGA-based high speed architecture for the AES-GCM standard, suitable for high speed embedded applications.application/pdf985899 bytesapplication/pdfenUniversity of WaterlooCopyright: 2006, Wang, Sheng. All rights reserved.Electrical & Computer EngineeringAESGCMSecurityArchitectureFPGAAn Architecture for the AES-GCM Security StandardThesis or DissertationElectrical and Computer EngineeringMaster of Applied Science |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
topic |
Electrical & Computer Engineering AES GCM Security Architecture FPGA |
spellingShingle |
Electrical & Computer Engineering AES GCM Security Architecture FPGA Wang, Sheng An Architecture for the AES-GCM Security Standard |
description |
The forth recommendation of symmetric block cipher mode of operation SP800-38D, <em>Galois/Counter Mode of Operation</em> (GCM) was developed by David A McGrew and John Viega. GCM uses an approved symmetric key block cipher with a block size of 128 bits and a universal hashing over a binary Galois field to provide confidentiality and authentication. It is built specifically to support very high data rates as it can take advantage of pipelining and parallel processing techniques. <br /><br /> Before GCM, SP800-38A only provided confidentiality and SP800-38B provided authentication. SP800-38C provided confidentiality using the counter mode and authentication. However the authentication technique in SP800-38C was not parallelizable and slowed down the throughput of the cipher. Hence, none of these three recommendations were suitable for high speed network and computer system applications. <br /><br /> With the advent of GCM, authenticated encryption at data rates of several Gbps is now practical, permitting high grade encryption and authentication on systems which previously could not be fully protected. However there have not yet been any published results on actual architectures for this standard based on FPGA technology. <br /><br /> This thesis presents a fully pipelined and parallelized hardware architecture for AES-GCM which is GCM running under symmetric block cipher AES on a FPGA multi-core platform corresponding to the IPsec ESP data flow. <br /><br /> The results from this thesis show that the round transformations of confidentiality and hash operations of authentication in AES-GCM can cooperate very efficiently within this pipelined architecture. Furthermore, this AES-GCM hardware architecture never unnecessarily stalls data pipelines. For the first time this thesis provides a complete FPGA-based high speed architecture for the AES-GCM standard, suitable for high speed embedded applications. |
author |
Wang, Sheng |
author_facet |
Wang, Sheng |
author_sort |
Wang, Sheng |
title |
An Architecture for the AES-GCM Security Standard |
title_short |
An Architecture for the AES-GCM Security Standard |
title_full |
An Architecture for the AES-GCM Security Standard |
title_fullStr |
An Architecture for the AES-GCM Security Standard |
title_full_unstemmed |
An Architecture for the AES-GCM Security Standard |
title_sort |
architecture for the aes-gcm security standard |
publisher |
University of Waterloo |
publishDate |
2007 |
url |
http://hdl.handle.net/10012/2885 |
work_keys_str_mv |
AT wangsheng anarchitecturefortheaesgcmsecuritystandard AT wangsheng architecturefortheaesgcmsecuritystandard |
_version_ |
1716572877456670720 |