Skip to main content

High-Speed Pipelined Hardware Architecture for Galois Counter Mode

  • Conference paper
Information Security (ISC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4779))

Included in the following conference series:

Abstract

In the authenticated encryption mode GCM (Galois Counter Mode), the CTR (counter) mode for data encryption that has no feedback path can easily be pipelined to boost the operating frequency of a hardware implementation. However, the hash function for the authentication tag generation performs multiply-add operations sequentially by chaining the result in the previous cycle, and this becomes the critical path in the high-speed GCM hardware. Therefore, we propose a high-speed pipelined hardware architecture for GCM in conjunction with a pipelined multiply-adder on a Galois field GF(2128). This architecture was implemented with a 4-stage pipelined multiply-adder and a 56-stage pipelined AES (Advanced Encryption Standard) circuit by using a 0.13-um CMOS standard cell library. This implementation showed very high throughput of 54.94 Gbps with 272 Kgates for the key lengths of 128, 192, and 256 bits. The high hardware efficiency (throughput/gate) of 201.75 Kbps/gate is also an improvement over prior art.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. McGrew, D., et al.: The Galois/Counter Mode of Operation (GCM) (May 2005), http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-revised-spec.pdf

  2. NIST, Recommendation for Block Cipher Modes of Operation: Methods and Techniques, Special Publication 800-38A (December 2001), http://csrc.nist.gov/CryptoToolkit/modes/800-38_Series_Publications/SP800-38A.pdf

  3. NIST, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) for Confidentiality and Authentication, Draft Special Publication 800-38D (April 2006), http://csrc.nist.gov/publications/drafts/Draft-NIST_SP800-38D_Public_Comment.pdf

  4. NIST, Advanced Encryption Standard (AES) FIPS Publication 197 (November 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf

  5. Viega, J., et al.: The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (EPS) RFC 4106 (June 2005), http://www.faqs.org/rfcs/rfc4106.htm

  6. IEEE, 802.1AE - Media Access Control (MAC) Security, Draft 3.5 (June 2005), http://www.ieee802.org/1/pages/802.1ae.html

  7. IEEE, P, 1/D12a - Standard for Authenticated Encryption with Length Expansion for Storage Devices (November 2006), http://grouper.ieee.org/groups/1619/email/bin00084.bin

  8. Kohno, T., et al.: Carter Wegman (authentication) with Counter (encryption) (May 2003), http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/cwc/cwc-spec.pdf

  9. Satoh, A.: High-Speed Hardware Architectures for Authenticated Encryption Mode GCM. In: Proc. IEEE ISCAS 2006, IEEE Computer Society Press, Los Alamitos (2006)

    Google Scholar 

  10. Satoh, A.: High-Speed Parallel Hardware Architecture for Galois Counter Mode. In: IEEE ISCAS 2007, IEEE Computer Society Press, Los Alamitos (2007)

    Google Scholar 

  11. Satoh, A., et al.: A Compact Rijndael Hardware Architecture with S-box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239–254. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  12. Yang, B., et al.: High Speed Architecture for Galois/Counter Mode of Operation (GCM), Cryptology ePrint Archive: Report 2005/146 (June 2005), http://eprint.iacr.org/2005/146.pdf

  13. Elliptic Semiconductor Inc, CLP-15/-16/-24 AES-GCM Core Preliminary Data Sheet (2004), http://www.ellipticsemi.com/

  14. IP Cores, Inc., GCM1/GCM2 802.1ae (MACSec) GCM/AES Cores (2006), http://www.ipcores.com/IEEE802.1AE-AES-GCM-Core.htm

  15. IBM Cu-11 Standard Cell / Gate Array ASIC, http://www-03.ibm.com/chips/products/asics/products/cu-11.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Juan A. Garay Arjen K. Lenstra Masahiro Mambo René Peralta

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Satoh, A., Sugawara, T., Aoki, T. (2007). High-Speed Pipelined Hardware Architecture for Galois Counter Mode. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds) Information Security. ISC 2007. Lecture Notes in Computer Science, vol 4779. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75496-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75496-1_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75495-4

  • Online ISBN: 978-3-540-75496-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics