cycle counts for authenticated encryption d j bernstein
play

Cycle counts for authenticated encryption D. J. Bernstein - PDF document

Cycle counts for authenticated encryption D. J. Bernstein http://cr.yp.to /streamciphers /timings.html Standard construction: encrypt with stream cipher; authenticate the ciphertext by appending encrypted hash. How to hash the ciphertext?


  1. Cycle counts for authenticated encryption D. J. Bernstein http://cr.yp.to /streamciphers /timings.html

  2. Standard construction: encrypt with stream cipher; authenticate the ciphertext by appending encrypted hash. How to hash the ciphertext? 1 ) + 2 ) + 3 ; AES(AES( MD5 with a secret IV; Poly1305, provable, fast; UMAC, faster given SSE2; VMAC, faster given AMD64; Badger; MAC1071; etc. How to encrypt the hash? The same stream cipher; MD5, secret IV; AES; etc.

  3. Cost of standard construction is cost of stream cipher plus cost of encrypted hash plus various overheads: e.g. cache misses (non-orthogonal). Alternative constructions? eSTREAM solicited schemes. Responses: NLS, Phelix, etc. Is an authenticating cipher, such as Phelix, faster than the standard construction? Previous eSTREAM timings didn’t include hash costs.

  4. Maybe the fastest AE scheme depends on the situation. Decrypting legitimate packets? Rejecting forged packets? Small packets? Large packets? More packet-size effects? Many keys active at once? Only one key? Pentium III? Pentium 4? Athlon? UltraSPARC III? PowerPC G5? Athlon 64 X2? Core 2 Duo? Let’s measure everything!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend