[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-031-50594-2_12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation

Published: 12 January 2024 Publication History

Abstract

In this paper, we propose Rocca-S, an authenticated encryption scheme with a 256-bit key and a 256-bit tag targeting 6G applications bootstrapped from AES.Rocca-S achieves an encryption/decryption speed of more than 200 Gbps in the latest software environments. In hardware implementation, Rocca-S is the first cryptographic algorithm to achieve speeds more than 2 Tbps without sacrificing other metrics such as occupied silicon area or power/energy consumption making Rocca-S a competitive choice satisfying the requirements of a wide spectrum of environments for 6G applications.

References

[1]
Caforio A, Balli F, and Banik S Melting SNOW-V: improved lightweight architectures J. Cryptogr. Eng. 2022 12 1 53-73
[2]
Eichlseder M, Nageler M, and Primas R Analyzing the linear keystream biases in AEGIS IACR Trans. Symmetric Cryptol. 2019 2019 4 348-368
[3]
Ekdahl P, Johansson T, Maximov A, and Yang J A new SNOW stream cipher called SNOW-V IACR Trans. Symmetric Cryptol. 2019 2019 3 1-42
[4]
Grassl M, Langenberg B, Roetteler M, and Steinwandt R Takagi T Applying Grover’s algorithm to AES: quantum resource estimates Post-Quantum Cryptography 2016 Cham Springer 29-43
[5]
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)
[6]
Hosoyamada A et al. Cryptanalysis of Rocca and feasibility of its security claim IACR Trans. Symmetric Cryptol. 2022 2022 3 123-151
[7]
Jean J and Nikolić I Peyrin T Efficient design strategies based on the AES round function Fast Software Encryption 2016 Heidelberg Springer 334-353
[8]
Kaplan M, Leurent G, Leverrier A, and Naya-Plasencia M Quantum differential and linear cryptanalysis IACR Trans. Symmetric Cryptol. 2016 2016 1 71-94
[9]
Latva-aho, M., Leppänen, K.: Key drivers and research challenges for 6G ubiquitous wireless intelligence (2019)
[10]
Li S, Sun S, Li C, Wei Z, and Lei H Constructing low-latency involutory MDS matrices with lightweight circuits IACR Trans. Symm. Cryptol. 2019 2019 1 84-117
[11]
Liu, F., Isobe, T., Meier, W., Sakamoto, K.: Weak keys in reduced aegis and Tiaoxin. Cryptology ePrint Archive, Report 2021/187 (2021). https://eprint.iacr.org/2021/187
[12]
Maximov, A.: AES MixColumn with 92 XOR gates. Cryptology ePrint Archive, Report 2019/833 (2019). https://eprint.iacr.org/2019/833
[13]
Maximov, A., Ekdahl, P.: New circuit minimization techniques for smaller and faster AES SBoxes. IACR TCHES 2019(4), 91–125 (2019). https://tches.iacr.org/index.php/TCHES/article/view/8346
[14]
David A Canteaut A and Viswanathan K McGrew and John Viega. The security and performance of the Galois/counter mode (GCM) of operation INDOCRYPT 2004 2004 Heidelberg Springer 343-355
[15]
Minaud, B.: Linear biases in AEGIS keystream. In: Joux, A., Youssef, A.M., editors, Selected Areas in Cryptography - SAC 2014–21st International Conference, Montreal, QC, Canada, August 14–15, 2014, Revised Selected Papers, volume 8781 of Lecture Notes in Computer Science, pp. 290–305. Springer (2014)
[16]
Mouha N, Wang Q, Gu D, and Preneel B Wu C-K, Yung M, and Lin D Differential and linear cryptanalysis using mixed-integer linear programming Information Security and Cryptology 2012 Heidelberg Springer 57-76
[17]
Nikolić, I.: Tiaoxin-346: version 2.0. CAESAR Competition (2014)
[18]
Real-Time and Embedded Sys Lab. uops.info. Official webpage. https://www.uops.info/
[19]
Sakamoto K, Liu F, Nakano Y, Kiyomoto S, and Isobe T Rocca: an efficient AES-based encryption scheme for beyond 5G IACR Trans. Symmetric Cryptol. 2021 2021 2 1-30
[20]
Sakamoto, K., Liu, F., Nakano, Y., Kiyomoto, S., Isobe, T.: Rocca: an efficient AES-based encryption scheme for beyond 5G (full version). IACR Cryptol. ePrint Arch., 116 (2022)
[22]
Wu Hongjun and Preneel Bart Lange Tanja, Lauter Kristin, and Lisoněk Petr AEGIS: a fast authenticated encryption algorithm Selected Areas in Cryptography – SAC 2013 2014 Heidelberg Springer 185-201

Cited By

View all

Index Terms

  1. An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        Computer Security – ESORICS 2023: 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25–29, 2023, Proceedings, Part I
        Sep 2023
        491 pages
        ISBN:978-3-031-50593-5
        DOI:10.1007/978-3-031-50594-2
        • Editors:
        • Gene Tsudik,
        • Mauro Conti,
        • Kaitai Liang,
        • Georgios Smaragdakis

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 12 January 2024

        Author Tags

        1. Authenticated Encryption
        2. High Throughput
        3. Quantum Security
        4. 6G

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 0
          Total Downloads
        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 14 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        View options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media