Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can be protected by encryption using ciphers and the integrity of the data can be ensured by using a cryptographic hash functions. Our work investigates how more efficient cryptographic circuits can be designed and implemented. We are interested in more efficient circuits because they will enable wider deployment of strong ciphers and hash functions for protecting data, while minimizing the overhead these cryptographic protections impose. Currently the work concentrates on symmetric-key ciphers and the new hash algorithms proposed for the National Institute of Standards and Technology (NIST) competition for Advanced Hash Algorithms (AHS).
We use field programable gate arrays (FPGAs) for implementing our proposals and prototyping the hardware. In addition to implementing stand-alone crypto blocks (e.g. AES accelerator) we are working on designing a platform (a collection of hardware components which implement different functionalities used by cryptographic algorithms) that can be used to enable rapid prototyping and deployment of cryptographic and other algorithms.
- Szefer, J., Chen, Y., Lee, R.B., "General-purpose FPGA Platform for Efficient Encryption and Hashing", Proceedings of the Application-specific Systems, Architectures and Processors (ASAP 2010) conference, July 7 - 9 2010.
- Lee, R.B., Chen, Y., "Processor Accelerator for AES", Proceedings of the 2010 IEEE 8th Symposium on Application Specific Processors, Anaheim, CA, USA, pp. 71-76, June 13-14 2010.
- A. Murat Fiskiran and Ruby B. Lee, On-Chip Lookup Tables for
Fast Symmetric-Key Encryption, Proceedings
of theIEEE 16th International Conference on Application-Specific
Systems, Architectures and Processors (ASAP), pp. 356-363, July
23-25, 2005. [PDF]
- A. Murat Fiskiran and Ruby B. Lee, Fast Parallel Table
Lookups to Accelerate Symmetric-Key Cryptography, Proceedings of the International Conference on Information Technology
Coding and Computing (ITCC), Embedded Cryptographic Systems Track, pp.
526-531, April 2005. [PDF]