DOI QR코드

DOI QR Code

A design of Giga-bit security module using Fully pipe-lined CTR-AES

Full-pipelined CTR-AES를 이용한 Giga-bit 보안모듈 설계

  • ;
  • 박주현 (전남대학교 컴퓨터정보통신학과) ;
  • 김영철 (전남대학교 컴퓨터정보통신학과) ;
  • 김광옥 (한국전자통신연구원)
  • Published : 2008.06.30

Abstract

Nowdays, homes and small businesses rely more and more PON(Passive Optical Networks) for financial transactions, private communications and even telemedicine. Thus, encryption for these data transactions is very essential due to the multicast nature of the PON In this parer, we presented our implementation of a counter mode AES based on Virtex4 FPGA. Our design exploits three advanced features; 1) Composite field arithmetic SubByte, 2) efficient MixColumn transformation 3) and on-the-fly key-scheduling for fully pipelined architecture. By pipeling the composite field implementation of the S-box, the area cost is reduced to average 17 percent. By designing the on-the-fly key-scheduling, we implemented an efficient key-expander module which is specialized for a pipelined architecture.

현재 가정과 소규모 사업장에서 재정적인 변화와 개인 커뮤니케이션 그리고 원격의료에 이르기까지 점점 GPON 사용이 일반화 되어가고 있다. 이러한 PON의 다중사용 때문에 개인정보 보호와 커뮤니케이션 보호를 위한 보안의 필요성이 더더욱 커지고 있다. 이를 위해 이 논문에서는 Virtex4 FPGA를 기반으로 AES의 카운터 모드를 구현하였다. 본 논문에서 구현된 구조는 pipeline 구조 구현을 위하여 크게 세 가지 특징을 가지고 있는데 1) composite filed 연산을 이용한 Subbyte, 2) efficient MixColumn transformation, 그리고 3) on-the-fly key scheduling이다. 구현된 S-box는 면적의 17% 감소와 on-the-fly key 스케줄링 기법으로 pipeline 구조에 특화된 key-expander 기능을 구현하였다.

Keywords

References

  1. 'Gigabit-capable Passive Optical Networks (G-POPN) : Transmission convergence layer specification', ITU-T G.984.3 Amendnment 1, July. 2005
  2. Morris Dworkin, 'Recommendation for Block Cipher Modes of Operation', NIST Special Publication, http://csrc.nist.gov/CryptoToolkit/modes/, 2001
  3. Shuenn-Shyang Wang; Wan-Sheng Ni, 'Aneffici-ent FPGA implementation of advanced encryption standard algorithm', Proceedings of the 2004 International Symposium on Circuits and Systems, Vol 2, 23-26 May 2004 Page(s):II 597-600 Vol 2
  4. Jae-Gon Lee, Woong Hwangbo, Seonpil Kim, Chong-Min Kyung, 'Top-down implementation of pipelined AES cipher and its verification with FPGA-based simulation accelerator', 6th International Conference On ASIC Proceedings, page(s): 68- 72, 24-27 Oct. 2005
  5. Saqib, N.A; Rodriguez-Henriquez, F ; Diaz-Pere, A. ' ES algorithm imlementation-an efficient approach for sequential and pipeline architectures', Proceedings of the Fourth Mexican International Conference on Computer Science, page(s): 126 - 130, 8-12 Sept. 2003
  6. Nedjah, N.; de Macedo Mourelle, L.; Cardoso, M.P., 'A Compact Pipelined Hardware Implementation of the AES-128 Cipher', ITNG 2006. Third International Conference on Information Technology: New Generations, page(s):216 - 221, 10-12 April 2006
  7. Yongzhi Fu; Lin Hao; Xuejie Zhang; Rujin Yang 'Design of an extremely high performance counter mode AES reconfigurable processor', Second International Conference on Embedded Software and Systems , 16-18 Dec. 2005 Page(s):7 pp
  8. Hodjat, A.; Verbauwhede, I., 'Area-throughput trade- offs for fully pipelined 30 to 70 Gbits/s AES processors', IEEE Transactions on Computers, Volume 55, Issue 4, page(s):366-372, April 2006 https://doi.org/10.1109/TC.2006.49
  9. Xinmiao Zhang; Parhi, K.K., 'High-speed VLSI architectures for the AES algorithm', IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol 12, Issue 9, page(s): 957-967, Sept. 2004 https://doi.org/10.1109/TVLSI.2004.832943
  10. V. Rijmen, 'Efficient Implementation of the Rijndael SBox', http://www.esat.kuleuven.ac.be/-rijmen/rijndael/
  11. J. Wolkerstorfer, E. Oswald, and M. Lamberger, 'An ASIC Implementation of the AES Sboxes', Proc. RSA Conf. 2002, Feb. 2002