• DocumentCode
    2397593
  • Title

    High performance pipelined architecture of Ghash

  • Author

    Bai, Yan ; Shou, Guochu ; Hu, Yihong ; Guo, Zhigang

  • Author_Institution
    Sch. of Inf. & Commun. Eng., Beijing Univ. of Posts & Telecommun., Beijing, China
  • fYear
    2010
  • fDate
    26-28 Oct. 2010
  • Firstpage
    716
  • Lastpage
    720
  • Abstract
    Ghash is the authentication function of GCM. In this paper, we propose a high performance pipelined architecture of Ghash. The pipelined architecture can boost the operating frequency of the hash function block that is the bottleneck for higher speed GCM hardware. The most attractive feature is our pipelined architecture based on divided-and-conquer algorithm. According to the architecture, the critical path of the multiply-adder used for Ghash is divided into 3-stage to obtain the higher throughput and reduce the time complexity. At the same, divided-and-conquer algorithm can efficiently reduce the space complexity. The proposed architecture is compared to previous work on resource consumption and throughput aspects, and evaluated by using Xilinx Virtex5. From the statistics of our analysis and implementation, the number of AND gates consumed reduces by 25%, the number of XOR gates consumed reduces by 21.4%, and the throughput increases by 12.556Gbps reaching to 43.32Gbps. This design makes it very easy to implement the low complexity and high speed architecture of Ghash, and the design adapts to high speed networks security for authentication function.
  • Keywords
    authorisation; computational complexity; cryptography; divide and conquer methods; logic gates; pipeline processing; AND gates; Ghash; XOR gates; Xilinx Virtex5; authentication function; divided-and-conquer algorithm; hash function block; high performance pipelined architecture; high speed architecture; high speed network security; higher speed GCM hardware; multiply-adder path; resource consumption; space complexity; time complexity; Clocks; Cryptography; Logic gates; Radiation detectors; Table lookup; Time frequency analysis; Authentication; Divided-and-Conquer; Galois Field; Ghash; Pipelined;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Broadband Network and Multimedia Technology (IC-BNMT), 2010 3rd IEEE International Conference on
  • Conference_Location
    Beijing
  • Print_ISBN
    978-1-4244-6769-3
  • Type

    conf

  • DOI
    10.1109/ICBNMT.2010.5705183
  • Filename
    5705183