Worcester Polytechnic Institute

Upcoming Seminar: Jens-Peter Kaps

  • Thursday, July 2 at 3pm in AK 218:

    Comparison of Multi-Purpose Cores of Keccak and AES on FPGAs
    Presenter: Jens-Peter Kaps (George Mason University)

    Most widely used security protocols, such as Internet Protocol Security (IPSec), Secure Socket Layer (SSL), and Transport Layer Security (TLS), provide several cryptographic services, which include authentication, confidentiality, integrity, and non-repudiation, which in turn require multiple dedicated cryptographic algorithms. A single cryptographic primitive for all secret key functions
    utilizing different mode of operations can overcome this constraint. This presentation investigates the possibility of using AES and the Keccak f-function as the underlying primitives for high-speed and resource constrained applications. The new secure hash standard SHA-3 and two candidates of the cryptographic Competition for Authenticated Encryption: Security, Applicability, and Robustness
    (CAESAR) namely Ketja and Keyak are built around the Keccak f-function. We are presenting two hardware implementations of each, a multi-purpose Keccak core and a multi-purpose Advanced Encryption Standard (AES) core, one targeting high-speed, the other low-area, which can provide Authenticated Encryption (AE), Message Authentication Code (MAC), generate pseudo-random numbers, and produce the hash of a message.

    The surprising result is that, even though a plain AES implementation is typically much smaller and has a better throughput to area ratio than a plain Keccak implementation, adding additional cryptographic services changes the results dramatically. Our multi-purpose Keccak outperforms our multi-purpose AES by a factor of 4 for throughput over area on average. This underlines the flexibility of the Keccak Sponge and Duplex functions. Our multi-purpose Keccak achieves a throughput of 23.2Gbps in AE-mode (Keyak) on a Xilinx Virtex-7 and 28.7Gbps on a Altera Stratix-IV.
    In order to study this further we also implemented two versions of a dedicated Keyak and dedicated AES-GCM. Our dedicated Keyak implementation outperforms our dedicated AES-GCM on average by a factor 6 in terms of throughput over area reaching a throughput of 28.9Gbps and 4.,Gbps respectively on a Xilinx Virtex-7.

  • Applied Cryptology Seminar
    The seminar features presentations of hot topics within the
    interdisciplinary field of cyber-security.

    All are welcome!

    For current information on the seminar, please visit: