2013 IEEE 56th International Midwest Symposium on Circuits and Systems (MWSCAS) 2013
DOI: 10.1109/mwscas.2013.6674921
|View full text |Cite
|
Sign up to set email alerts
|

Efficient AES-GCM for VPNs using FPGAs

Abstract: Since its acceptance as the adopted authenticated encryption algorithm, AES-GCM has been utilized in various security-constrained applications. This paper describes the benefits of adding key-synthesized property to AES-GCM using FPGAs. Presented architectures can be used for applications which require encryption and authentication with slow changing keys like Virtual Private Networks (VPNs). Our architectures were evaluated using Virtex4 and Virtex5 FPGAs. It is shown that the performance of the presented AES… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 8 publications
(18 reference statements)
0
1
0
Order By: Relevance
“…Many papers have optimized implementations of GCM, increasing its throughput and the speed of its internal operations in application-specific integrated circuit (ASIC)-based architectures [19][20][21][22][23] or field programmable gate array (FPGA)-based architectures [24][25][26][27][28][29][30][31]. GCM is also used in network-based systems to secure communication [32][33][34][35][36][37]. GCM has been used in automotive [38] and IOT domains [39,40] as well.…”
Section: The Gcm Hashing Algorithmmentioning
confidence: 99%
“…Many papers have optimized implementations of GCM, increasing its throughput and the speed of its internal operations in application-specific integrated circuit (ASIC)-based architectures [19][20][21][22][23] or field programmable gate array (FPGA)-based architectures [24][25][26][27][28][29][30][31]. GCM is also used in network-based systems to secure communication [32][33][34][35][36][37]. GCM has been used in automotive [38] and IOT domains [39,40] as well.…”
Section: The Gcm Hashing Algorithmmentioning
confidence: 99%