HPAZ:a High-throughput Pipeline Architecture of ZUC in Hardware

来源 :中国密码学会2013年密码芯片学术会议 | 被引量 : 0次 | 上传用户:sddcx
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  In this paper, we propose a high-throughput pipeline architecture of the stream cipher ZUC which has been included in the security portfolio of 3GPP LTE-Advanced.In the literature, the schema with the highest throughput only implements the working stage of ZUC.The designs which implement ZUC completely can only achieve a much lower through put, since a self-feedback loop in the critical path significantly reduces operating frequency.In this paper we design a mixed two-stage pipeline architecture which not only completely implements ZUC but also significantly raises the throughput.We have implemented our architecture on FPGA and ASIC.On FPGA platform, the new architecture increases the throughput by 45%, compared with the latest work, and particularly the new architecture also saves nearly 12% of hardware resource.On 65nm ASIC technology, the throughput of the new design can up to 80Gbps, which is 2.7 times faster than the fastest one in the literature, in particularly, it also saves at least 40% of hardware resource.In addition to the academic design, compared with the fastest commercial design, the new architecture doubles the throughput of that.To the best of our knowledge, this evaluation result is so far the best outcome.It can be assumed that hardware implementations of ZUC following our architecture will fit in future LTE equipments better.
其他文献
2006年Prouff等人提出了基于傅立叶谱变换技术的抗DPA攻击的S盒实现方案.此后2008和2009年Coron和Yang Li等人分别对其方案进行改进,但改进后的方案算法仍然较复杂,不便于硬件实现.本文针对硬件电路的特点,对原方案进行分析优化,并提出了一种高效可行的硬件实现方案.更进一步的引入了walsh谱变换技术,克服了原方案在硬件实现过程中可能存在的安全漏洞.文章最后给出了实际实现的电路
内部模板攻击主要利用密码运行过程中处理不同密钥片段的旁路泄露进行密钥分析,克服了传统模板攻击需要获取模板密码设备的条件限制,相关研究是近年来国内外旁路攻击的热点.本文对内部模板攻击进行了三点改进:一是在数据预处理方面,对数据对齐、数据切割、特征检测方法进行了改进,消除了模板建立过程中的数据干扰;二是在模板匹配分析方面,提出了一种基于等级相关性的模板匹配策略,利用功耗曲线电压值的相对排名,提高了单个
SMS4 is the first official released commercial cryptographic algorithm.It provides unified standards for designing and using local area wireless network product.The general DPA attack is not suitable
Algebraic side-channel attack (ASCA) has to rely on a machine solver to solve the equations of the cipher and side channel leaks.Many existing ASCAs utilize the SAT-based solver or the optimizer-based
报告从评估者的角度关注智能卡芯片的侧信道安全问题.首先,分析和总结了芯片安全测评过程中发现的与侧信道和差错注入穿透性分析相关的问题,主要分析对象包括DES、RSA以及SM2等算法构造过程中常用的防护措施,并指出这些措施由于使用不当或缺乏细致的考虑而仍可能遭受攻击.其次,报告简要介绍了芯片密码算法侧信道安全性评估的方法.
The extensive set of physical attack techniques implies to a clear threat to devices that execute cryptography.A fault attack actively influences exe cution and hopes to retrieve information from unin
通过对侵入式分析路径的研究,并结合芯片的物理设计架构,对敏感信号进行寻找和探测,通过对环境的筹备、探测工具的尝试以及各项分析资源配置,推导出一种可行的侵入式被动分析方法,并在密码芯片中进行了探测实践,取得一定成效,为更深入的侵入式分析奠定技术通道.
As a combination of algebraic attacks and side channel attacks, the ASCA (Algebraic Side-Channel Attack) has become a very effective attack against block ciphers.From cryptographic designers point of
为配合人民银行全面推动金融IC卡的应用发展,满足金融IC卡安全应用的需要,中国银联组织编写了银联芯片卡安全规范和检测规范,并由国家发改委立项在银行卡检测中心建设"国家金融IC卡安全检测中心",进而建立国内金融IC卡芯片检测认证体系.经过两年多的建设,金融IC卡芯片检测认证体系已初步建成.其中针对金融IC卡芯片的检测,按测试类型分为侵入式、非侵入式和半侵入式三大类共计三十一个检测项,将金融IC卡芯片
In 2011 Li et al.presented clockwise collision anal ysis on non-protected AES hardware implementation.In this paper, we first propose a new clockwise collision attack called Fault Rate Analysis (FRA)