Optimization and benchmark of cryptographic algorithms on network processors

As requirements for communication security grow, cryptographic processing becomes another type of application domain. However, cryptographic algorithms are all computationally intensive. This work compares and analyzes architectural characteristics of many widespread cryptographic algorithms on the Intel IXP2800 network processor. It also investigates several implementation and optimization principles that can improve overall performance. The results reported here are applicable to other network processors because they have similar components and architectures.

[1]  Phillip Rogaway,et al.  A Software-Optimized Encryption Algorithm , 1998, Journal of Cryptology.

[2]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[3]  R. Schroeppel,et al.  Towards High Performance Cryptographic Software , 1995, Third IEEE Workshop on the Architecture and Implementation of High Performance Communication Subsystems.

[4]  Tilman Wolf,et al.  CommBench-a telecommunications benchmark for network processors , 2000, 2000 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS (Cat. No.00EX422).

[5]  Ralph C. Merkle,et al.  Fast Software Encryption Functions , 1990, CRYPTO.

[6]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[7]  Xuejia Lai,et al.  On the design and security of block ciphers , 1992 .

[8]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Haiyong Xie,et al.  Architectural Analysis of Cryptographic Applications for Network Processors , 2002 .

[11]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[12]  Mark Merkow,et al.  The Complete Guide to Internet Security , 2000 .

[13]  Erich M. Nahum,et al.  Parallelized network security protocols , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.

[14]  T. N. Vijaykumar,et al.  Accelerating private-key cryptography via multithreading on symmetric multiprocessors , 2003, 2003 IEEE International Symposium on Performance Analysis of Systems and Software. ISPASS 2003..

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Wendong Hu,et al.  NetBench: a benchmarking suite for network processors , 2001, IEEE/ACM International Conference on Computer Aided Design. ICCAD 2001. IEEE/ACM Digest of Technical Papers (Cat. No.01CH37281).

[17]  Lizy Kurian John,et al.  NpBench: a benchmark suite for control plane and data plane applications for network processors , 2003, Proceedings 21st International Conference on Computer Design.

[18]  Elaine B. Barker,et al.  Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.

[19]  Phillip Rogaway,et al.  A Software-Optimised Encryption Algorithm , 1993, FSE.