How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4(Symmetric Key Cryptography, <Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing speed by considering the internal pipeline architecture of these processors. This is the first paper studying an optimization of ciphers on Prescott, a new core of Pentium 4. Our AES program with 128-bit key achieves 251 cycles/block on Pentium 4, which is, to our best knowledge, the fastest implementation of AES on Pentium 4. We also optimize SNOW2.0 keystream generator. Our program of SNOW2.0 runs at the rate of 2.75μops/cycle on Pentium III, which seems the most efficient code ever made for a real-world cipher primitive. Our another interest is to optimize cryptographic primitives that essentially utilize 64-bit operations on Pentium processors. For the first example, the FOX128 block cipher, we propose a technique for speeding-up by interleaving two independent blocks using a register group separation. For another examples, we consider fast implementation of SHA512 and Whirlpool. It will be shown that the new SIMD instruction sets introduced in Pentium 4 excellently contribute to fast hashing of SHA512.
- 社団法人電子情報通信学会の論文
- 2006-01-01
著者
-
Fukuda Sayaka
Information Technology R&d Laboratories Mitsubishi Electric Corporation
-
MATSUI Mitsuru
Information Technology R&D Laboratories, Mitsubishi Electric Corporation
-
Matsui Mitsuru
Information Technology R&d Center Mitsubishi Electric Corporation
-
Matsui Mitsuru
Information Technology R&d Laboratories Mitsubishi Electric Corporation
関連論文
- How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4(Symmetric Key Cryptography, Cryptography and Information Security)
- Planar Avalanche Photodiode for Long-Haul Single-Photon Optic Fiber Communications
- An Experimental Realization of Quantum Cryptosystem(Special Section on Cryptography and Information Security)
- Fast Software Implementations of MISTY1 on Alpha Processors (Special Section on Cryptography and Information Security)
- A Small and Fast Software Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-Bit Microcomputer (Special Section on Cryptography and Information Security)
- On a Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of Block Cipher Xenon(Special Section on Cryptography and Information Security)
- FOREWORD