• Skip navigation
  • Skip to navigation
  • Skip to the bottom
Simulate organization breadcrumb open Simulate organization breadcrumb close
Friedrich-Alexander-Universität IT Security Infrastructures Lab
  • FAUTo the central FAU website
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Suche öffnen
  • Campo
  • StudOn
  • FAUdir
  • Jobs
  • Map
  • Help
  1. Friedrich-Alexander-Universität
  2. Technische Fakultät
  3. Department Informatik
Friedrich-Alexander-Universität IT Security Infrastructures Lab
Navigation Navigation close
  • Research
    • Forensic Computing Group
    • Human Factors in Security and Privacy Group
    • Multimedia Security
    • Security Education Development Group
    • System Security Group
    • Information Security Group
    • Archive
    • Funded Projects
    • Publications
    Portal Research
  • Lab
    • Staff & Research Groups
    • Alumni
    • Partners
    • FAU i1 Webshop
    Portal Lab
  • Teaching
    • Courses
    • General Information regarding Teaching/Courses
    • Notes on Examinations
    • eTeaching
    • Theses
    • Writing a Thesis at Informatik 1
    Portal Teaching
  • How to reach us
  1. Home
  2. Research
  3. System Security Group
  4. AVX Crypto: AVX Instructions to Accelerate Crypto Primitives

AVX Crypto: AVX Instructions to Accelerate Crypto Primitives

In page navigation: Research
  • Forensic Computing Group
  • Human Factors in Security and Privacy Group
  • Information Security Group
  • Multimedia Security
  • Security Education Development Group
  • System Security Group
    • AppAuth: On App-based Matrix Code Authentication in Online Banking
    • AppTAN (In)Security: (In)Security of App-based TAN Methods in Online Banking
    • AVX Crypto: AVX Instructions to Accelerate Crypto Primitives
    • Bispe: A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
    • Centroid
    • CPU-bound Encryption (TRESOR, TreVisor, ARMORED)
    • FROST: Forensic Recovery Of Scrambled Telephones
    • How Android’s UI Security is Undermined by Accessibility
    • HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
    • N26
    • Nomorp
    • On the Prevalence and Usage of TEE-based Features on Android
    • One Key to Rule Them All: Recovering the Master Key from RAM to break Android's File-Based Encryption
    • RamCrypt: Kernel-based Address Space Encryption for User-mode Processes
    • ReFuzz — Structure Aware Fuzzing of the Resilient File System (ReFS)
    • RISCoT - Security Analysis of Trusted Execution Environments on RISC-V
    • SED (In)Security: Hardware-based Full Disk Encryption (In)Security
    • SGX-Kernel: Isolating Operating System Components with Intel SGX
    • SGX-Timing: Cache Attacks on Intel SGX
    • SoK: The Evolution of Trusted UI on Mobile
    • Soteria: Offline Software Protection within Low-cost Embedded Devices
    • STARK / MARK: Tamperproof/Mutual Authentication to Resist Keylogging
    • TEEshift: Protecting Code Confidentiality by Selectively Shifting Functions into TEEs
    • VMAttack: Deobfuscating Virtualization-Based Packed Binaries
  • Archive
  • Funded Projects
  • Publications

AVX Crypto: AVX Instructions to Accelerate Crypto Primitives

AVX Instructions to Accelerate Crypto Primitives

Intel has released a new SIMD instruction set called AVX (Advanced Vector Extensions) in 2011. Compared to SSE, AVX has some interesting new features for accelerating crypto primitives: The 128 bit registers have been expanded to 256 bits, a nondestructive three-operand syntax has been added, and a new extension coding scheme (VEX) has been designed. Therefore we have implemented five common block ciphers, namely Serpent, Twofish, Blowfish, Cast-128, and Cast-256, exploiting the new Advanced Vector Extensions and its proposed successor AVX2.

Our AVX implementations are running on recent CPUs that support AVX, such as Sandy and Ivy Bridge processors. Our AVX2 implementations will run on upcoming Intel CPUs that launch market presumably in 2013. For the AVX variants we already provide Linux kernel patches that integrate our implementations into the kernel Crypto API. Most notably, this allows Linux users to run our cipher implementations with dm-crypt based disk encryption. We were able to contribute four out of five implementations (Serpent, Twofish, Cast-128, and Cast-256) to the mainline kernel; the implementations of Serpent and Twofish will already be available in Linux 3.6.

Implementations:
Serpent [ AVX , AVX2 ]
Twofish [ AVX , AVX2 ]
Blowfish [ AVX , AVX2 ]
Cast-128 [ AVX , AVX2 ]
Cast-256 [ AVX , AVX2 ]

Information:
Bachelor thesis (by Johannes Götzfried; advisor: Tilo Müller)
Research paper, EUROSEC’13 Slides (presented at EUROSEC 2013)

Lehrstuhl für Informatik 1
Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU)

Martensstrasse 3
91058 Erlangen
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Facebook
  • RSS Feed
  • Twitter
  • Xing
Up