Where academic tradition
meets the exciting future

Accelerating Cryptographic Protocols: A Review of Theory and Technologies

Antti Hakkala, Seppo Virtanen, Accelerating Cryptographic Protocols: A Review of Theory and Technologies. In: Eugen Borcoci, Pascal Lorenz, Michel Diaz (Eds.), Proceendings of the Fourth International Conference on Communication Theory, Reliability, and Quality of Service, 103-109, IARIA, 2011.

Abstract:

Modern cryptography applications require significant processing power and resources on computers. To make implementations of these algorithms comply with the rising requirements of speed and throughput of modern applications, the use of instruction set extensions and external cryptography processors has become more and more commonplace. While cryptography algorithms can and do differ significantly in their design and functionality, there are certain algebraic operations which are used throughout all algorithm types. In this paper, we review the fundamental operations that can be found behind several cryptography algorithms currently in use. We examine the need for enhancing the performance of cryptographic protocols and available methods for accelerating the computation of such algorithms. We discuss current methods for accelerating their performance and examine the use of instruction set extensions for cryptography algorithms, particularly the cases where an instruction set can be used for multiple purposes. We conclude that future applications require making these instruction sets as general as possible to support a wide range of algorithms.

BibTeX entry:

@INPROCEEDINGS{iHaVi11a,
  title = {Accelerating Cryptographic Protocols: A Review of Theory and Technologies},
  booktitle = {Proceendings of the Fourth International Conference on Communication Theory, Reliability, and Quality of Service},
  author = {Hakkala, Antti and Virtanen, Seppo},
  editor = {Borcoci, Eugen and Lorenz, Pascal and Diaz, Michel},
  publisher = {IARIA},
  pages = {103-109},
  year = {2011},
  keywords = {Cryptography; Instruction Set Extensions; Embedded Security; ASIP},
}

Belongs to TUCS Research Unit(s): Communication Systems (ComSys)

Edit publication