Presentation 2013-03-07
Extensive Performance Analysis of Cryptographic Primitives on the RL78 Microcontroller RL78 Microcontroller
Yumiko MURAKAMI, Mitsuru MATSUI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper studies state-of-the-art software implementation of lightweight hash primitives from embed- ded system programmer's standpoint. In embedded environments, due to many possible variations of ROM and RAM size combinations, it is not always easy to obtain an entire performance picture of a given primitive and to create a fair benchmark from the top speed records. In this study we classify these size combinations into several categories and optimize operation speed in each category. We implemented eight hash functions, SHA-256/512, Keccak256/512, Skein256/512, and Gr0stl-256/512, on Renesas' RL78 microcontroller with various combinations of ROM and RAM sizes to make performance characteristics of the primitives clearer. We also discuss how to create an interface and measure size and speed of a given primitive from a practical point of view. As a result, our SHA codes achieve top class speed in most categories. For another implementation aiming at minimizing the ROM size, we have achieved 453-byte Keccak and 396-byte Skein256 on the processor.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Light-weight cryptography / Hash function / Embedded software
Paper # IT2012-74,ISEC2012-92,WBS2012-60
Date of Issue

Conference Information
Committee ISEC
Conference Date 2013/2/28(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Extensive Performance Analysis of Cryptographic Primitives on the RL78 Microcontroller RL78 Microcontroller
Sub Title (in English)
Keyword(1) Light-weight cryptography
Keyword(2) Hash function
Keyword(3) Embedded software
1st Author's Name Yumiko MURAKAMI
1st Author's Affiliation Mitsubishi Electric Corporation, Information Technology R&D Center()
2nd Author's Name Mitsuru MATSUI
2nd Author's Affiliation Mitsubishi Electric Corporation, Information Technology R&D Center
Date 2013-03-07
Paper # IT2012-74,ISEC2012-92,WBS2012-60
Volume (vol) vol.112
Number (no) 461
Page pp.pp.-
#Pages 7
Date of Issue