Proceedings of the 42nd Annual Conference on Design Automation - DAC '05 2005
DOI: 10.1145/1065579.1065642
|View full text |Cite
|
Sign up to set email alerts
|

High performance encryption cores for 3G networks

Abstract: This paper presents two novel and high performance hardware architectures, implemented in FPGA technology, for the KASUMI block cipher; this algorithm lies at the core of the confidentiality and integrity algorithms defined for the Universal Mobile Telecommunication System (UMTS) standard. The first proposal is a pipelined design and the second implements an iterative approach. The throughput for these architectures turn out to be higher than the throughput achieved by other proposals.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 3 publications
(1 reference statement)
0
2
0
Order By: Relevance
“…Figure 1 shows the elements that make up the algorithm, how the input plaintext block is split into sections, the operations performed on every Figure 1 are neither UML diagrams nor block diagrams of a hardware architecture that implements the algorithm. It is possible to manipulate the structure of KASUMI to build implementations that consume fewer resources or achieve higher performance [13,14]. An activity diagram in UML 2 may be used to represent the flow of data and the operations required by the components of KASUMI.…”
Section: High-level Modeling Of Block Ciphers Using Umlmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 1 shows the elements that make up the algorithm, how the input plaintext block is split into sections, the operations performed on every Figure 1 are neither UML diagrams nor block diagrams of a hardware architecture that implements the algorithm. It is possible to manipulate the structure of KASUMI to build implementations that consume fewer resources or achieve higher performance [13,14]. An activity diagram in UML 2 may be used to represent the flow of data and the operations required by the components of KASUMI.…”
Section: High-level Modeling Of Block Ciphers Using Umlmentioning
confidence: 99%
“…The previous example illustrated the synthesis of VHDL code from a description of KASUMI intended to optimize the performance of the resulting digital hardware system. Alternatively, the designer may manipulate the structure of the model of KASUMI to simplify the algorithm and produce area‐efficient systems like those described by the authors previously . Thus, the designer is responsible for building models according to a strategy for reaching a specific design goal.…”
Section: Transformation Of Models Into Vhdl Codementioning
confidence: 99%