A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography

Paper 2019/1273

A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography

Jens-Peter Kaps, William Diehl, Michael Tempelmeier, Farnoud Farahmand, Ekawat Homsirikamol, and Kris Gaj

Abstract

In this paper, we propose a comprehensive framework for fair and efficient benchmarking of hardware implementations of lightweight cryptography (LWC). Our framework is centered around the hardware API (Application Programming Interface) for the implementations of lightweight authenticated ciphers, hash functions, and cores combining both functionalities. The major parts of our API include the minimum compliance criteria, interface, and communication protocol supported by the LWC core. The proposed API is intended to meet the requirements of all candidates submitted to the NIST Lightweight Cryptography standardization process, as well as all CAESAR candidates and current authenticated cipher and hash function standards. In order to speed-up the development of hardware implementations compliant with this API, we are making available the LWC Development Package and the corresponding Implementer’s Guide. Equipped with these resources, hardware designers can focus on implementing only a core functionality of a given algorithm. The development package facilitates the communication with external modules, full verification of the LWC core using simulation, and generation of optimized results. The proposed API for lightweight cryptography is a superset of the CAESAR Hardware API, endorsed by the organizers of the CAESAR competition, which was successfully used in the development of over 50 implementations of Round 2 and Round 3 CAESAR candidates. The primary extensions include support for optional hash functionality and the development of cores resistant against side-channel attacks. Similarly, the LWC Development Package is a superset of the part of the CAESAR Development Package responsible for support of Use Case 1 (lightweight) CAESAR candidates. The primary extensions include support for hash functionality, increasing the flexibility of the code shared among all candidates, as well as extended support for the detection of errors preventing the correct operation of cores during experimental testing. Overall, our framework supports (a) fair ranking of candidates in the NIST LWC standardization process from the point of view of their efficiency in hardware before and after the implementation of countermeasures against side-channel attacks, (b) ability to perform benchmarking within the limited time devoted to Round2 and any subsequent rounds of the NIST LWC standardization process, (c) compatibility among implementations of the same algorithm by different designers and (d) fast deployment of the best algorithms in real-life applications.

Note: Presented at the Lightweight Cryptography Workshop 2019, Gaithersburg, MD, Nov. 4-6, 2019 (workshop without proceedings).

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
lightweight cryptographysecret-key cryptographyauthenticated ciphershash functionshardware implementationsAPIside-channel analysis
Contact author(s)
jkaps @ gmu edu
wdiehl @ vt edu
michael tempelmeier @ tum de
ffarahma @ gmu edu
ekawat @ gmail com
kgaj @ gmu edu
History
2019-11-05: received
Short URL
https://ia.cr/2019/1273
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2019/1273,
      author = {Jens-Peter Kaps and William Diehl and Michael Tempelmeier and Farnoud Farahmand and Ekawat Homsirikamol and Kris Gaj},
      title = {A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography},
      howpublished = {Cryptology {ePrint} Archive, Paper 2019/1273},
      year = {2019},
      url = {https://eprint.iacr.org/2019/1273}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.