NORX: Parallel and Scalable AEAD View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Jean-Philippe Aumasson , Philipp Jovanovic , Samuel Neves

ABSTRACT

This paper introduces NORX, a novel authenticated encryption scheme supporting arbitrary parallelism degree and based on ARX primitives, yet not using modular additions. NORX has a unique parallel architecture based on the monkeyDuplex construction, with an original domain separation scheme for a simple processing of header, payload and trailer data. Furthermore, NORX specifies a dedicated datagram to facilitate interoperability and avoid users the trouble of defining custom encoding and signalling. NORX was optimized for efficiency in both software and hardware, with a SIMD-friendly core, almost byte-aligned rotations, no secret-dependent memory lookups, and only bitwise operations. On a Haswell processor, a serial version of NORX runs at 2.51 cycles per byte. Simulations of a hardware architecture for 180 nm UMC ASIC give a throughput of approximately 10Gbps at 125MHz. More... »

PAGES

19-36

Book

TITLE

Computer Security - ESORICS 2014

ISBN

978-3-319-11211-4
978-3-319-11212-1

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-11212-1_2

DOI

http://dx.doi.org/10.1007/978-3-319-11212-1_2

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1048723509


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Kudelski Security, Switzerland", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Kudelski Security, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Passau, Germany", 
          "id": "http://www.grid.ac/institutes/grid.11046.32", 
          "name": [
            "University of Passau, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jovanovic", 
        "givenName": "Philipp", 
        "id": "sg:person.016300712435.04", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016300712435.04"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Coimbra, Portugal", 
          "id": "http://www.grid.ac/institutes/grid.8051.c", 
          "name": [
            "University of Coimbra, Portugal"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Neves", 
        "givenName": "Samuel", 
        "id": "sg:person.011136377232.42", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136377232.42"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "This paper introduces NORX, a novel authenticated encryption scheme supporting arbitrary parallelism degree and based on ARX primitives, yet not using modular additions. NORX has a unique parallel architecture based on the monkeyDuplex construction, with an original domain separation scheme for a simple processing of header, payload and trailer data. Furthermore, NORX specifies a dedicated datagram to facilitate interoperability and avoid users the trouble of defining custom encoding and signalling. NORX was optimized for efficiency in both software and hardware, with a SIMD-friendly core, almost byte-aligned rotations, no secret-dependent memory lookups, and only bitwise operations. On a Haswell processor, a serial version of NORX runs at 2.51 cycles per byte. Simulations of a hardware architecture for 180 nm UMC ASIC give a throughput of approximately 10Gbps at 125MHz.", 
    "editor": [
      {
        "familyName": "Kuty\u0142owski", 
        "givenName": "Miros\u0142aw", 
        "type": "Person"
      }, 
      {
        "familyName": "Vaidya", 
        "givenName": "Jaideep", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-11212-1_2", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-11211-4", 
        "978-3-319-11212-1"
      ], 
      "name": "Computer Security - ESORICS 2014", 
      "type": "Book"
    }, 
    "keywords": [
      "encryption scheme", 
      "hardware architecture", 
      "parallelism degree", 
      "parallel architecture", 
      "Haswell processor", 
      "bitwise operations", 
      "serial version", 
      "memory lookups", 
      "modular addition", 
      "architecture", 
      "NORX", 
      "interoperability", 
      "scheme", 
      "datagrams", 
      "lookup", 
      "AEAD", 
      "hardware", 
      "primitives", 
      "users", 
      "processors", 
      "bytes", 
      "header", 
      "software", 
      "simple processing", 
      "throughput", 
      "encoding", 
      "ASIC", 
      "processing", 
      "payload", 
      "operation", 
      "version", 
      "simulations", 
      "efficiency", 
      "separation scheme", 
      "data", 
      "construction", 
      "trouble", 
      "core", 
      "addition", 
      "rotation", 
      "degree", 
      "cycle", 
      "paper"
    ], 
    "name": "NORX: Parallel and Scalable AEAD", 
    "pagination": "19-36", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1048723509"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-11212-1_2"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-11212-1_2", 
      "https://app.dimensions.ai/details/publication/pub.1048723509"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-06-01T22:34", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_400.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-319-11212-1_2"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11212-1_2'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11212-1_2'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11212-1_2'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-11212-1_2'


 

This table displays all metadata directly associated to this object as RDF triples.

128 TRIPLES      23 PREDICATES      69 URIs      62 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-11212-1_2 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N4592e5c16e64440388f0aaed9515070f
4 schema:datePublished 2014
5 schema:datePublishedReg 2014-01-01
6 schema:description This paper introduces NORX, a novel authenticated encryption scheme supporting arbitrary parallelism degree and based on ARX primitives, yet not using modular additions. NORX has a unique parallel architecture based on the monkeyDuplex construction, with an original domain separation scheme for a simple processing of header, payload and trailer data. Furthermore, NORX specifies a dedicated datagram to facilitate interoperability and avoid users the trouble of defining custom encoding and signalling. NORX was optimized for efficiency in both software and hardware, with a SIMD-friendly core, almost byte-aligned rotations, no secret-dependent memory lookups, and only bitwise operations. On a Haswell processor, a serial version of NORX runs at 2.51 cycles per byte. Simulations of a hardware architecture for 180 nm UMC ASIC give a throughput of approximately 10Gbps at 125MHz.
7 schema:editor N7247596749ab4900bf24bf0fc22cc33d
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N0b6368bab9ed4b699cd98be9b9bc6215
12 schema:keywords AEAD
13 ASIC
14 Haswell processor
15 NORX
16 addition
17 architecture
18 bitwise operations
19 bytes
20 construction
21 core
22 cycle
23 data
24 datagrams
25 degree
26 efficiency
27 encoding
28 encryption scheme
29 hardware
30 hardware architecture
31 header
32 interoperability
33 lookup
34 memory lookups
35 modular addition
36 operation
37 paper
38 parallel architecture
39 parallelism degree
40 payload
41 primitives
42 processing
43 processors
44 rotation
45 scheme
46 separation scheme
47 serial version
48 simple processing
49 simulations
50 software
51 throughput
52 trouble
53 users
54 version
55 schema:name NORX: Parallel and Scalable AEAD
56 schema:pagination 19-36
57 schema:productId N705c2ed763cb45fcb5a34bd7ced61404
58 N85723da0936242438f6bb2a5e3050393
59 schema:publisher N51bdb95d3bf9466bad4c68c0282e0d5e
60 schema:sameAs https://app.dimensions.ai/details/publication/pub.1048723509
61 https://doi.org/10.1007/978-3-319-11212-1_2
62 schema:sdDatePublished 2022-06-01T22:34
63 schema:sdLicense https://scigraph.springernature.com/explorer/license/
64 schema:sdPublisher Ndf975623261a4e6d90096b926fccf966
65 schema:url https://doi.org/10.1007/978-3-319-11212-1_2
66 sgo:license sg:explorer/license/
67 sgo:sdDataset chapters
68 rdf:type schema:Chapter
69 N0b6368bab9ed4b699cd98be9b9bc6215 schema:isbn 978-3-319-11211-4
70 978-3-319-11212-1
71 schema:name Computer Security - ESORICS 2014
72 rdf:type schema:Book
73 N337a7b749c6a4720b25acea848ab5d2c schema:familyName Vaidya
74 schema:givenName Jaideep
75 rdf:type schema:Person
76 N4592e5c16e64440388f0aaed9515070f rdf:first sg:person.012606440341.66
77 rdf:rest N6b16c2b2b4114a38ae7a5d153997efe2
78 N51bdb95d3bf9466bad4c68c0282e0d5e schema:name Springer Nature
79 rdf:type schema:Organisation
80 N6b16c2b2b4114a38ae7a5d153997efe2 rdf:first sg:person.016300712435.04
81 rdf:rest N95472307749144c6b0cc535f0dd1fced
82 N705c2ed763cb45fcb5a34bd7ced61404 schema:name doi
83 schema:value 10.1007/978-3-319-11212-1_2
84 rdf:type schema:PropertyValue
85 N7247596749ab4900bf24bf0fc22cc33d rdf:first Nae8be37f56a74debaf09826ca822774b
86 rdf:rest N9eb615c6f40e43b5bd161d395784668d
87 N85723da0936242438f6bb2a5e3050393 schema:name dimensions_id
88 schema:value pub.1048723509
89 rdf:type schema:PropertyValue
90 N95472307749144c6b0cc535f0dd1fced rdf:first sg:person.011136377232.42
91 rdf:rest rdf:nil
92 N9eb615c6f40e43b5bd161d395784668d rdf:first N337a7b749c6a4720b25acea848ab5d2c
93 rdf:rest rdf:nil
94 Nae8be37f56a74debaf09826ca822774b schema:familyName Kutyłowski
95 schema:givenName Mirosław
96 rdf:type schema:Person
97 Ndf975623261a4e6d90096b926fccf966 schema:name Springer Nature - SN SciGraph project
98 rdf:type schema:Organization
99 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
100 schema:name Information and Computing Sciences
101 rdf:type schema:DefinedTerm
102 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
103 schema:name Computer Software
104 rdf:type schema:DefinedTerm
105 sg:person.011136377232.42 schema:affiliation grid-institutes:grid.8051.c
106 schema:familyName Neves
107 schema:givenName Samuel
108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136377232.42
109 rdf:type schema:Person
110 sg:person.012606440341.66 schema:affiliation grid-institutes:None
111 schema:familyName Aumasson
112 schema:givenName Jean-Philippe
113 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
114 rdf:type schema:Person
115 sg:person.016300712435.04 schema:affiliation grid-institutes:grid.11046.32
116 schema:familyName Jovanovic
117 schema:givenName Philipp
118 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016300712435.04
119 rdf:type schema:Person
120 grid-institutes:None schema:alternateName Kudelski Security, Switzerland
121 schema:name Kudelski Security, Switzerland
122 rdf:type schema:Organization
123 grid-institutes:grid.11046.32 schema:alternateName University of Passau, Germany
124 schema:name University of Passau, Germany
125 rdf:type schema:Organization
126 grid-institutes:grid.8051.c schema:alternateName University of Coimbra, Portugal
127 schema:name University of Coimbra, Portugal
128 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...