High-speed memory encryption-decryption in embedded systems
This report is part of a follow-up of a project completed in 2015 that involved memory authentication using Tamper Evident Counter (TEC) trees that was implemented on a NIOS II soft processor on a Cyclone II FPGA. This report focusses on the optimisation of the Advanced Encryption Standard (AES)...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/66612 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-66612 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-666122023-03-03T20:48:01Z High-speed memory encryption-decryption in embedded systems Lim, Qi Wei Lam Siew Kei School of Computer Engineering Centre for High Performance Embedded Systems DRNTU::Engineering::Computer science and engineering::Data::Data encryption This report is part of a follow-up of a project completed in 2015 that involved memory authentication using Tamper Evident Counter (TEC) trees that was implemented on a NIOS II soft processor on a Cyclone II FPGA. This report focusses on the optimisation of the Advanced Encryption Standard (AES) cipher as implemented in the previous project; the algorithm is analysed and the AddRoundKey and MixColumns steps are modified. The implementation is unchanged otherwise – the key size, block size and block cipher mode are fixed at 128 bits, 128 bits and Counter (CTR) mode respectively. A series of tests are conducted to quantify the performance improvement of the optimised versions over the baseline. Performance counters are used to measure the time and clock cycles taken for the program to process a specified number of plaintexts. The results are then tabulated and compared to determine their relative effectiveness. The results show that for this particular implementation, streamlining the flow of data by reducing the number of accesses has a significant impact on the execution speed: aes_optimised, a version of the cipher with only the modified AddRoundKey function, is about 171% faster than the baseline at all tested sample sizes. However, further optimisations in the form of pre-computed T-tables only resulted in another 16.9% performance increase. These findings suggest that optimising the data flow may be a viable option as well. Bachelor of Engineering (Computer Engineering) 2016-04-19T01:32:18Z 2016-04-19T01:32:18Z 2016 Final Year Project (FYP) http://hdl.handle.net/10356/66612 en Nanyang Technological University 44 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Computer science and engineering::Data::Data encryption |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Data::Data encryption Lim, Qi Wei High-speed memory encryption-decryption in embedded systems |
description |
This report is part of a follow-up of a project completed in 2015 that involved memory
authentication using Tamper Evident Counter (TEC) trees that was implemented on a NIOS II soft
processor on a Cyclone II FPGA. This report focusses on the optimisation of the Advanced Encryption
Standard (AES) cipher as implemented in the previous project; the algorithm is analysed and the
AddRoundKey and MixColumns steps are modified. The implementation is unchanged otherwise –
the key size, block size and block cipher mode are fixed at 128 bits, 128 bits and Counter (CTR) mode
respectively.
A series of tests are conducted to quantify the performance improvement of the optimised versions
over the baseline. Performance counters are used to measure the time and clock cycles taken for the
program to process a specified number of plaintexts. The results are then tabulated and compared
to determine their relative effectiveness.
The results show that for this particular implementation, streamlining the flow of data by reducing
the number of accesses has a significant impact on the execution speed: aes_optimised, a version
of the cipher with only the modified AddRoundKey function, is about 171% faster than the baseline
at all tested sample sizes. However, further optimisations in the form of pre-computed T-tables only
resulted in another 16.9% performance increase. These findings suggest that optimising the data
flow may be a viable option as well. |
author2 |
Lam Siew Kei |
author_facet |
Lam Siew Kei Lim, Qi Wei |
format |
Final Year Project |
author |
Lim, Qi Wei |
author_sort |
Lim, Qi Wei |
title |
High-speed memory encryption-decryption in embedded systems |
title_short |
High-speed memory encryption-decryption in embedded systems |
title_full |
High-speed memory encryption-decryption in embedded systems |
title_fullStr |
High-speed memory encryption-decryption in embedded systems |
title_full_unstemmed |
High-speed memory encryption-decryption in embedded systems |
title_sort |
high-speed memory encryption-decryption in embedded systems |
publishDate |
2016 |
url |
http://hdl.handle.net/10356/66612 |
_version_ |
1759856586433495040 |