Javascript must be enabled to continue!
Adiantum: length-preserving encryption for entry-level processors
View through CrossRef
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the fastest options for hashing and stream encryption for processors without AES or other crypto instructions, with a provable quadratic advantage bound. Our composition Adiantum uses NH, Poly1305, XChaCha12, and a single AES invocation. On an ARM Cortex-A7 processor, Adiantum decrypts 4096-byte messages at 10.6 cycles per byte, over five times faster than AES-256-XTS, with a constant-time implementation. We also define HPolyC which is simpler and has excellent key agility at 13.6 cycles per byte.
Universitatsbibliothek der Ruhr-Universitat Bochum
Title: Adiantum: length-preserving encryption for entry-level processors
Description:
We present HBSH, a simple construction for tweakable length-preserving encryption which supports the fastest options for hashing and stream encryption for processors without AES or other crypto instructions, with a provable quadratic advantage bound.
Our composition Adiantum uses NH, Poly1305, XChaCha12, and a single AES invocation.
On an ARM Cortex-A7 processor, Adiantum decrypts 4096-byte messages at 10.
6 cycles per byte, over five times faster than AES-256-XTS, with a constant-time implementation.
We also define HPolyC which is simpler and has excellent key agility at 13.
6 cycles per byte.
Related Results
Innovations in Multicore Network Processor Design for Enhanced Performance
Innovations in Multicore Network Processor Design for Enhanced Performance
The rapid expansion of network traffic, driven by the proliferation of internet-connected devices and the growing demand for high-speed data transmission, has intensified the need ...
Runahead threads
Runahead threads
Los temas de investigación sobre multithreading han ganado mucho interés en la arquitectura de computadores con la aparición de procesadores multihilo y multinucleo. Los procesador...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Performance simulation methodologies for hardware/software co-designed processors
Performance simulation methodologies for hardware/software co-designed processors
Recently the community started looking into Hardware/Software (HW/SW) co-designed processors as potential solutions to move towards the less power consuming and the less complex de...
Microbial Contamination and Occurrence of Aflatoxins in Processed Baobab Products in Kenya
Microbial Contamination and Occurrence of Aflatoxins in Processed Baobab Products in Kenya
Baobab fruit demand has been on the rise in the recent past, and in an attempt to match the demand, farmers and middlemen are forced to harvest immature fruits which are not fully ...
HANSRAJ (Adiantum capillus-veneris) -A REVIEW
HANSRAJ (Adiantum capillus-veneris) -A REVIEW
Hansraj(Adiantum capillus-veneris) is an herbal plant used in Unanisystem of medicine since ancient time. Leaf, roots, stem of the plant are mainly used in the treatment ofkidney s...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...

