Home // CTRQ 2011, The Fourth International Conference on Communication Theory, Reliability, and Quality of Service // View article


Accelerating Cryptographic Protocols: A Review of Theory and Technologies

Authors:
Antti Hakkala
Seppo Virtanen

Keywords: Cryptography; Instruction Set Extensions; Embedded Security; ASIP

Abstract:
Modern cryptography applications require significant processing power and resources on computers. To make implementations of these algorithms comply with the rising requirements of speed and throughput of modern applications, the use of instruction set extensions and external cryptography processors has become more and more commonplace. While cryptography algorithms can and do differ significantly in their design and functionality, there are certain algebraic operations which are used throughout all algorithm types. In this paper, we review the fundamental operations that can be found behind several cryptography algorithms currently in use. We examine the need for enhancing the performance of cryptographic protocols and available methods for accelerating the computation of such algorithms. We discuss current methods for accelerating their performance and examine the use of instruction set extensions for cryptography algorithms, particularly the cases where an instruction set can be used for multiple purposes. We conclude that future applications require making these instruction sets as general as possible to support a wide range of algorithms.

Pages: 103 to 109

Copyright: Copyright (c) IARIA, 2011

Publication date: April 17, 2011

Published in: conference

ISSN: 2308-4022

ISBN: 978-1-61208-126-7

Location: Budapest, Hungary

Dates: from April 17, 2011 to April 22, 2011