Improving dm-crypt performance for XTS-AES mode through extended requests: first results - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Improving dm-crypt performance for XTS-AES mode through extended requests: first results

Jean-Louis Roch
Jean-Michel Tenkes
  • Fonction : Auteur
  • PersonId : 993873

Résumé

Using dedicated hardware is common practice in order to accelerate cryptographic operations: complex operations are managed by a dedicated co-processor and RAM/crypto-engine data transfers are fully managed by DMA operations. The CPU is therefore free for other tasks, which is vital in embedded environments with limited CPU power. In this work we discuss and benchmark XTS-AES, using either software or mixed approaches, using Linux and dm-crypt, and a low-power At-mel(tm) board. This board featurs an AES crypto-engine that supports ECB-AES but not the XTS-AES mode. We show that the dm-crypt module used in Linux for full disk encryption has limitations that can be relaxed when considering larger block sizes. In particular we demonstrate that performance gains almost by a factor two are possible, which opens new opportunities for future use-cases.
Fichier principal
Vignette du fichier
grehack16_dmcrypt_performance_for_aes_xts.pdf (386.56 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01399967 , version 1 (21-11-2016)

Identifiants

  • HAL Id : hal-01399967 , version 1

Citer

Levent Demir, Mathieu Thiery, Vincent Roca, Jean-Louis Roch, Jean-Michel Tenkes. Improving dm-crypt performance for XTS-AES mode through extended requests: first results. GreHack 2016. The 4th International Symposium on Research in Grey-Hat Hacking - aka GreHack , Nov 2016, Grenoble, France. ⟨hal-01399967⟩
591 Consultations
2220 Téléchargements

Partager

Gmail Facebook X LinkedIn More