Publication detail
Comparative Analysis of Different Implementations of Encryption Algorithms on FPGA Network Cards
SMÉKAL, D. HAJNÝ, J. MARTINÁSEK, Z.
Original Title
Comparative Analysis of Different Implementations of Encryption Algorithms on FPGA Network Cards
English Title
Comparative Analysis of Different Implementations of Encryption Algorithms on FPGA Network Cards
Type
conference paper
Language
en
Original Abstract
The article compares the suitability of implementation and security of the bestknown symmetric block ciphers. Based on an analysis, the article describes the implementation of AES and Twofish. The article includes block cipher modes of operation, namely Cipher Block Chaining (CBC), Counter mode (CTR), and Galois/Counter Mode (GCM). This work has been successfully verified, synthesized and implemented on network cards using Xilinx Virtex-7 and Virtex UltraScale+.
English abstract
The article compares the suitability of implementation and security of the bestknown symmetric block ciphers. Based on an analysis, the article describes the implementation of AES and Twofish. The article includes block cipher modes of operation, namely Cipher Block Chaining (CBC), Counter mode (CTR), and Galois/Counter Mode (GCM). This work has been successfully verified, synthesized and implemented on network cards using Xilinx Virtex-7 and Virtex UltraScale+.
Keywords
Cryptography, Security, AES, Twofish, FPGA, CBC, CTR, GCM
Released
23.05.2018
Publisher
IFAC-PapersOnLine
Location
Ostrava
ISBN
2405-8963
Periodical
IFAC-PapersOnLine (ELSEVIER)
Year of study
51
Number
6
State
NL
Pages from
312
Pages to
317
Pages count
6
Documents
BibTex
@inproceedings{BUT149389,
author="David {Smékal} and Jan {Hajný} and Zdeněk {Martinásek}",
title="Comparative Analysis of Different Implementations of Encryption Algorithms on FPGA Network Cards",
annote="The article compares the suitability of implementation and security of the bestknown symmetric block ciphers. Based on an analysis, the article describes the implementation of AES and Twofish. The article includes block cipher modes of operation, namely Cipher Block Chaining (CBC), Counter mode (CTR), and Galois/Counter Mode (GCM). This work has been successfully verified, synthesized and implemented on network cards using Xilinx Virtex-7 and Virtex UltraScale+.",
address="IFAC-PapersOnLine",
booktitle="15th IFAC Conference on Programmable Devices and Embedded Systems PDeS 2018",
chapter="149389",
doi="10.1016/j.ifacol.2018.07.172",
howpublished="online",
institution="IFAC-PapersOnLine",
number="6",
year="2018",
month="may",
pages="312--317",
publisher="IFAC-PapersOnLine",
type="conference paper"
}