DocumentCode :
1197691
Title :
Hardware performance analysis of the SHACAL-2 encryption algorithm
Author :
McLoone, M.
Author_Institution :
Inst. of Electron., Queen´´s Univ. Belfast, UK
Volume :
152
Issue :
5
fYear :
2005
Firstpage :
478
Lastpage :
484
Abstract :
A hardware performance analysis of the SHACAL-2 encryption algorithm is presented. SHACAL-2 was one of four private-key algorithms chosen in the New European Schemes for Signatures, Integrity and Encryption (NESSIE) initiative. To the author´s knowledge, there has been no previous published research work conducted on hardware SHACAL-2 architectures. Consequently, in this paper, both iterative and pipelined designs are developed and implemented. A fully pipelined encryption SHACAL-2 architecture implemented on a Virtex-II XC2V4000 device achieves a throughput of over 25 Gbit/s. This is one of the fastest encryption algorithm implementations currently available. The iterative encryption architecture operates at 432 Mbit/s on the XC2V500 device. A comparison is provided between SHACAL-2 hardware designs that incorporate carry save adders and designs that include typical full adders. The SHACAL-2 decryption algorithm is also clearly defined in the paper as it was not provided in the NESSIE submission.
Keywords :
adders; cryptography; performance evaluation; pipeline processing; 25 Gbit/s; 432 Mbits/s; SHACAL-2 decryption algorithm; SHACAL-2 encryption algorithm; SHACAL-2 hardware design; Virtex-II XC2V4000 device; Virtex-II XC2V500 device; carry save adders; full adders; fully pipelined encryption SHACAL-2 architecture; hardware performance analysis; iterative encryption architecture; private-key algorithm;
fLanguage :
English
Journal_Title :
Circuits, Devices and Systems, IEE Proceedings -
Publisher :
iet
ISSN :
1350-2409
Type :
jour
DOI :
10.1049/ip-cds:20059027
Filename :
1522046
Link To Document :
بازگشت