Accelerating symmetric and asymmetric ciphers with register file extension for multi-word and long-word operation

Hoon Lee Sang, Choi Lynn

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this paper, we propose a new register file architecture called the Register File Extension for Multi-word and Long-word Operation (RFEMLO) to accelerate both symmetric and asymmetric cryptographic algorithms. Based on the idea that most of cryptographic algorithms heavily use multi-word or long-word operations, RFEMLO allows multiple contiguous registers to be specified as a single operand. RFEMLO can be applied to a general purpose processor by providing an instruction set extension and an additional functional unit. To evaluate the performance of RFEMLO, we use Simplescalar/ARM 3.0 (with gcc 2.95.2) and run detailed simulations on various cryptographic algorithms. The simulation results show that we could achieve 83% and 138% performance gain in both symmetric and asymmetric ciphers by applying RFEMLO to a conventional superscalar processor.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Information Science and Security, ICISS 2008
PublisherIEEE Computer Society
Pages102-107
Number of pages6
ISBN (Print)076953080X, 9780769530802
DOIs
Publication statusPublished - 2008
EventInternational Conference on Information Science and Security, ICISS 2008 - Seoul, Korea, Republic of
Duration: 2008 Jan 102008 Jan 12

Publication series

NameProceedings of the International Conference on Information Science and Security, ICISS 2008

Other

OtherInternational Conference on Information Science and Security, ICISS 2008
CountryKorea, Republic of
CitySeoul
Period08/1/1008/1/12

ASJC Scopus subject areas

  • Computer Science(all)
  • Computer Networks and Communications

Cite this

Sang, H. L., & Lynn, C. (2008). Accelerating symmetric and asymmetric ciphers with register file extension for multi-word and long-word operation. In Proceedings of the International Conference on Information Science and Security, ICISS 2008 (pp. 102-107). [4438218] (Proceedings of the International Conference on Information Science and Security, ICISS 2008). IEEE Computer Society. https://doi.org/10.1109/ICISS.2008.32