Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.5.3

Structure Analysis of ARS Cryptoprocessor based on Network Environment  

Yun, Yeon-Sang (Dept. of Information and Communication Engineering, Chungbuk Nat'1 University)
Jo, Kwang-Doo (Dept. of Information and Communication Engineering, Chungbuk Nat'1 University)
Han, Seon-Kyoung (Dept. of Information and Communication Engineering, Chungbuk Nat'1 University)
You, Young-Gap (Dept. of Information and Communication Engineering, Chungbuk Nat'1 University)
Kim, Yong-Dae (The Korea Intelligent Property Office)
Abstract
This paper presents a performance analysis model based on an M/M/1 queue and Poisson distribution of input data traffic. The simulation on a pipelined AES system with processing rate of 10 rounds per clock shows $4.0\%$ higher performance than a non-pipelined version consuming 10 clocks per transaction. Physical implementation of pipelined AES with FPGA takes 3.5 times bigger gate counts than the non-pipelined version whereas the pipelined version yields only $3.5\%$ performance enhancement. The proposed analysis model can be used to optimize cost-performance of AES hardware designs.
Keywords
AES; Cryptoprocessor; Performance Analysis;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. Merkow and J. Breithaupt, The Complete Guide to Internet Security, AMACOM, 2000
2 C. Fraleigh and S. Moon, 'Packetlevel traffic measurements from the SPRINT IP backbone,' IEEE Journal of Network, vol. 17, pp. 6-16, Nov. 2003
3 Ho Won Kim and Sunggu Lee, 'Design and implementation of a private and public key cryptoprocessor and its application to a security system,' Consumer Electronics, IEEE Transactions on, vol. 50, Issue 1, pp. 214-224, Feb 2004   DOI   ScienceOn
4 S. Miltchev and S. Ioannidis, 'A study of the relative costs of network security protocols,' In Proceedings of USENIX Annual Technical Conf., Freenix Track, pp. 41-48, June 2002
5 D.C. Feldmeier and T.M. Raleigh, 'Protocol boosters,' IEEE Journal on Selected Areas in Communications, vol. 16, Issue 3, pp. 437-444, April 1998   DOI   ScienceOn
6 Broadcom Co., BCM5820 Product Brief, http://www.broadcom.com
7 최병윤, 박영수, '모듈화된 라운드 키 생성회로를 갖는 AES 암호 프로세서의 설계,' 정보보호학회 논문지, 제 12권, 5호, 15-25쪽, 2002년 10월
8 National Institute of Standards and Technology, Announcing the Advanced Encryption Standard (AES), http://csrc.nist.gov
9 안하기, 신경욱, 'AES Rijndael 블록 암호 알고리듬의 효율적인 하드웨어 구현,' 정보보호학회 논문지, 제 12권, 2호, 53-63쪽, 2002년 4월
10 I. Cao and M. Anderson, 'Web server performance modeling using an M/G/1/K* PS queue,' 10th Int'l. Conf. on Telecommunications, vol. 2, pp. 1501-1506, Feb. 2003
11 CAVIUM co., IPSec/SSL NITROX-XL NHB Acceleration Boards Product Brief, http://www.cavium.com
12 A.V. Borshchev and Y.G. Karpov, 'System modeling, simulation and analysis using COVERS active objects,' IEEE Workshop on Engineering of Computer Based Systems (ECBS '97), pp. 220-227, Mar 1997
13 XJ Technologies, Anylogic4.5 Product Overview, http://www.xjtek.com
14 M. McLoone and J.V. McCanny, 'A single-chip IPSec cryptographic processor,' IEEE Workshop on Signal Processing Systems. pp. 133-138, Oct. 2002