Abstract
Most encryption algorithms are designed without regard to their performance on top-of-the-line microprocessors. This paper discusses general optimization principles algorithms designers should keep in mind when designing algorithms, and analyzes the performance of RC4, SEAL, RC5, Blowfish, and Khufu/Khafre on the Intel Pentium with respect to those principles. Finally, we suggest directions for algorithm design, and give example algorithms, that take performance into account.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
C.M. Adams, “Simple and Effective Key Scheduling for Symmetric Ciphers,≓ Workshop on Selected Areas in Cryptography—Workshop Record, Kingston, Ontario, 5–6 May 1994, pp. 129–133.
C.M. Adams, “Symmetric cryptographic system for data encryption,≓ U.S. patent 5,511,123, 23 Apr 1996.
C.M. Adams and S.E. Tavares, “Designing S-Boxes for Ciphers Resistant to Differential Cryptanalysis,≓ Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography, Rome, Italy, 15–16 Feb 1993, pp. 181–190.
A. Bosselaers, R. Govaerts, and J. Vandewalle, “Fast Hashing on the Pentium,≓ Advances in Cryptology⇽RYPTO ’96, Springer-Verlag, 1996, pp. 298–312.
D. Coppersmith and P Rogaway, “Software-efficient pseudorandom function and the use thereof for encryption,≓ U.S. patent 5,454,039, 26 Sep 1995.
P. Kocher, “Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems,≓ Advances in Cryptology—CRYPTO ’96, Springer-Verlag, 1996, pp. 104–113.
X. Lai, J. Massey, and S. Murphy, “Markov Ciphers and Differential Cryptanalysis,≓ Advances in Cryptology—CRYPTO ’91, Springer-Verlag, 1991, pp. 17–38.
W.E. Madryga, “A High Performance Encryption Algorithm,≓ Computer Security: A Global Challenge, Elsevier Science Publishers, 1984, pp. 557–570.
J.L. Massey and X. Lai, “Device for Converting a Digital Block and the Use Thereof,≓ International Patent PCT/CH91/00117, 28 Nov 1991.
R. Merkle, “A Fast Software Encryption Function,≓ Advances in Cryptology—CRYPTO ’90 Proceedings, Springer-Verlag, 1991, pp. 476–501.
R. Merkle, “Method and apparatus for data encryption,≓ U.S. patent 5,003,597, 26 Mar 1991.
National Bureau of Standards, NBS FIPS PUB 46, “Data Encryption Standard,≓ National Bureau of Standards, U.S. Department of Commerce, Jan 1977.
R.L. Rivest, “The RC5 Encryption Algorithm,≓ Fast Software Encryption, Second International Workshop Proceedings, Springer-Verlag, 1995, pp. 86–96.
P. Rogaway and D. Coppersmith, “A Software-Optimized Encryption Algorithm,≓ Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 56–63.
B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),≓ Fast Software Encryption, Cambridge Security Workshop Proceedings, Springer-Verlag, 1994, pp. 191–204.
B. Schneier, Applied Crytography, 2nd Edition, John Wiley & Sons, 1996.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Schneier, B., Whiting, D. (1997). Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium processor. In: Biham, E. (eds) Fast Software Encryption. FSE 1997. Lecture Notes in Computer Science, vol 1267. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0052351
Download citation
DOI: https://doi.org/10.1007/BFb0052351
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63247-4
Online ISBN: 978-3-540-69243-0
eBook Packages: Springer Book Archive