Skip to Main content Skip to Navigation
Conference papers

Improving dm-crypt performance for XTS-AES mode through extended requests: first results

Abstract : Using dedicated hardware is common practice in order to accelerate cryptographic operations: complex operations are managed by a dedicated co-processor and RAM/crypto-engine data transfers are fully managed by DMA operations. The CPU is therefore free for other tasks, which is vital in embedded environments with limited CPU power. In this work we discuss and benchmark XTS-AES, using either software or mixed approaches, using Linux and dm-crypt, and a low-power At-mel(tm) board. This board featurs an AES crypto-engine that supports ECB-AES but not the XTS-AES mode. We show that the dm-crypt module used in Linux for full disk encryption has limitations that can be relaxed when considering larger block sizes. In particular we demonstrate that performance gains almost by a factor two are possible, which opens new opportunities for future use-cases.
Document type :
Conference papers
Complete list of metadatas

Cited literature [7 references]  Display  Hide  Download
Contributor : Vincent Roca <>
Submitted on : Monday, November 21, 2016 - 11:24:46 AM
Last modification on : Friday, August 7, 2020 - 3:00:22 AM
Long-term archiving on: : Monday, March 20, 2017 - 6:11:24 PM


Files produced by the author(s)


  • HAL Id : hal-01399967, version 1



Levent Demir, Mathieu Thiery, Vincent Roca, Jean-Louis Roch, Jean-Michel Tenkes. Improving dm-crypt performance for XTS-AES mode through extended requests: first results. GreHack 2016. The 4th International Symposium on Research in Grey-Hat Hacking - aka GreHack , Nov 2016, Grenoble, France. ⟨hal-01399967⟩



Record views


Files downloads