Home // CTRQ 2011, The Fourth International Conference on Communication Theory, Reliability, and Quality of Service // View article
Accelerating Cryptographic Protocols: A Review of Theory and Technologies
Authors:
Antti Hakkala
Seppo Virtanen
Keywords: Cryptography; Instruction Set Extensions; Embedded Security; ASIP
Abstract:
Modern cryptography applications require significant processing power and resources on computers. To make implementations of these algorithms comply with the rising requirements of speed and throughput of modern applications, the use of instruction set extensions and external cryptography processors has become more and more commonplace. While cryptography algorithms can and do differ significantly in their design and functionality, there are certain algebraic operations which are used throughout all algorithm types. In this paper, we review the fundamental operations that can be found behind several cryptography algorithms currently in use. We examine the need for enhancing the performance of cryptographic protocols and available methods for accelerating the computation of such algorithms. We discuss current methods for accelerating their performance and examine the use of instruction set extensions for cryptography algorithms, particularly the cases where an instruction set can be used for multiple purposes. We conclude that future applications require making these instruction sets as general as possible to support a wide range of algorithms.
Pages: 103 to 109
Copyright: Copyright (c) IARIA, 2011
Publication date: April 17, 2011
Published in: conference
ISSN: 2308-4022
ISBN: 978-1-61208-126-7
Location: Budapest, Hungary
Dates: from April 17, 2011 to April 22, 2011