Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
AES instruction set
Extension to the x86 instruction set

An Advanced Encryption Standard instruction set (AES instruction set) is a set of instructions that are specifically designed to perform AES encryption and decryption operations efficiently. These instructions are typically found in modern processors and can greatly accelerate AES operations compared to software implementations. An AES instruction set includes instructions for key expansion, encryption, and decryption using various key sizes (128-bit, 192-bit, and 256-bit).

The instruction set is often implemented as a set of instructions that can perform a single round of AES along with a special version for the last round which has a slightly different method.

When AES is implemented as an instruction set instead of as software, it can have improved security, as its side channel attack surface is reduced.

We don't have any images related to AES instruction set yet.
We don't have any YouTube videos related to AES instruction set yet.
We don't have any PDF documents related to AES instruction set yet.
We don't have any Books related to AES instruction set yet.

x86 architecture processors

AES-NI (or the Intel Advanced Encryption Standard New Instructions; AES-NI) was the first major implementation. AES-NI is an extension to the x86 instruction set architecture for microprocessors from Intel and AMD proposed by Intel in March 2008.2

A wider version of AES-NI, AVX-512 Vector AES instructions (VAES), is found in AVX-512.3

Instructions

InstructionDescription4
AESENCPerform one round of an AES encryption flow
AESENCLASTPerform the last round of an AES encryption flow
AESDECPerform one round of an AES decryption flow
AESDECLASTPerform the last round of an AES decryption flow
AESKEYGENASSISTAssist in AES round key generation5
AESIMCAssist in AES decryption round key generation. Applies Inverse Mix Columns to round keys.

Intel

The following Intel processors support the AES-NI instruction set:6

  • Westmere based processors, specifically:
    • Westmere-EP (a.k.a. Gulftown Xeon 5600-series DP server model) processors
    • Clarkdale processors (except Core i3, Pentium and Celeron)
    • Arrandale processors (except Celeron, Pentium, Core i3, Core i5-4XXM)
  • Sandy Bridge processors:
    • Desktop: all except Pentium, Celeron, Core i378
    • Mobile: all Core i7 and Core i5. Several vendors have shipped BIOS configurations with the extension disabled;9 a BIOS update is required to enable them.10
  • Ivy Bridge processors
    • All i5, i7, Xeon and i3-2115C11 only
  • Haswell processors (all except i3-4000m,12 Pentium and Celeron)
  • Broadwell processors (all except Pentium and Celeron)
  • Silvermont/Airmont processors (all except Bay Trail-D and Bay Trail-M)
  • Goldmont (and later) processors
  • Skylake (and later) processors

AMD

Several AMD processors support AES instructions:

Hardware acceleration in other architectures

AES support with unprivileged processor instructions is also available in the latest SPARC processors (T3, T4, T5, M5, and forward) and in latest ARM processors. The SPARC T4 processor, introduced in 2011, has user-level instructions implementing AES rounds.14 These instructions are in addition to higher level encryption commands. The ARMv8-A processor architecture, announced in 2011, including the ARM Cortex-A53 and A57 (but not previous v7 processors like the Cortex A5, 7, 8, 9, 11, 15 ) also have user-level instructions which implement AES rounds.15

x86 CPUs offering non-AES-NI acceleration interfaces

VIA x86 CPUs and AMD Geode use driver-based accelerated AES handling instead. (See Crypto API (Linux).)

The following chips, while supporting AES hardware acceleration, do not support AES-NI:

ARM architecture

Programming information is available in ARM Architecture Reference Manual ARMv8, for ARMv8-A architecture profile (Section A2.3 "The Armv8 Cryptographic Extension").21

The Marvell Kirkwood was the embedded core of a range of SoC from Marvell Technology, these SoC CPUs (ARM, mv_cesa in Linux) use driver-based accelerated AES handling. (See Crypto API (Linux).)

  • ARMv8-A architecture
    • ARM cryptographic extensions are optionally supported on ARM Cortex-A30/50/70 cores
  • Cryptographic hardware accelerators/engines

RISC-V architecture

The scalar and vector cryptographic instruction set extensions for the RISC-V architecture were ratified respectively on 2022 and 2023, which allowed RISC-V processors to implement hardware acceleration for AES, GHASH, SHA-256, SHA-512, SM3, and SM4.

Before the AES-specific instructions were available on RISC-V, a number of RISC-V chips included integrated AES co-processors. Examples include:

  • Dual-core RISC-V 64 bits Sipeed-M1 support AES and SHA256.28
  • RISC-V architecture based ESP32-C (as well as Xtensa-based ESP3229), support AES, SHA, RSA, RNG, HMAC, digital signature and XTS 128 for flash.30
  • Bouffalo Labs BL602/604 32-bit RISC-V supports various AES and SHA variants.31

POWER architecture

Since the Power ISA v.2.07, the instructions vcipher and vcipherlast implement one round of AES directly.32

IBM z/Architecture

IBM z9 or later mainframe processors support AES as single-opcode (KM, KMC) AES ECB/CBC instructions via IBM's CryptoExpress hardware.33 These single-instruction AES versions are therefore easier to use than Intel NI ones, but may not be extended to implement other algorithms based on AES round functions (such as the Whirlpool and Grøstl hash functions).

Other architectures

  • Atmel XMEGA34 (on-chip accelerator with parallel execution, not an instruction)
  • SPARC T3 and later processors have hardware support for several cryptographic algorithms, including AES.
  • Cavium Octeon MIPS35 All Cavium Octeon MIPS-based processors have hardware support for several cryptographic algorithms, including AES using special coprocessor 3 instructions.

Performance

In AES-NI Performance Analyzed, Patrick Schmid and Achim Roos found "impressive results from a handful of applications already optimized to take advantage of Intel's AES-NI capability".36 A performance analysis using the Crypto++ security library showed an increase in throughput from approximately 28.0 cycles per byte to 3.5 cycles per byte with AES/GCM versus a Pentium 4 with no acceleration.3738 [better source needed]

Supporting software

Most modern compilers can emit AES instructions.

A lot of security and cryptography software supports the AES instruction set, including the following notable core infrastructure:

Application beyond AES

A fringe use of the AES instruction set involves using it on block ciphers with a similarly-structured S-box, using affine transform to convert between the two. SM4, Camellia and ARIA have been accelerated using AES-NI.545556 The AVX-512 Galois Field New Instructions (GFNI) allows implementing these S-boxes in a more direct way.57

New cryptographic algorithms have been constructed to specifically use parts of the AES algorithm, so that the AES instruction set can be used for speedups. The AEGIS family, which offers authenticated encryption, runs with at least twice the speed of AES.58 AEGIS is an "additional finalist for high-performance applications" in the CAESAR Competition.59

See also

Notes

References

  1. "Securing the Enterprise with Intel AES-NI" (PDF). Intel Corporation. Archived (PDF) from the original on 2013-03-31. Retrieved 2017-07-26. https://www.intel.in/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf

  2. "Intel Software Network". Intel. Archived from the original on 7 April 2008. Retrieved 2008-04-05. https://web.archive.org/web/20080407095317/http://softwareprojects.intel.com/avx/

  3. "Intel Architecture Instruction Set Extensions and Future Features Programming Reference". Intel. Retrieved October 16, 2017. https://software.intel.com/en-us/intel-architecture-instruction-set-extensions-programming-reference

  4. Shay Gueron (2010). "Intel Advanced Encryption Standard (AES) Instruction Set White Paper" (PDF). Intel. Retrieved 2012-09-20. https://www.intel.com/content/dam/doc/white-paper/advanced-encryption-standard-new-instructions-set-paper.pdf

  5. The instruction computes 4 parallel subexpressions of AES key expansion on 4 32-bit words in a double quadword (aka SSE register) on bits X[127:96] for i = 3 {\displaystyle i=3} and X[63:32] for i = 1 {\displaystyle i=1} only. Two parallel AES S-box substitutions Y 0 = S u b W o r d ( X 1 ) {\displaystyle Y_{0}=SubWord(X_{1})} and Y 2 = S u b W o r d ( X 3 ) {\displaystyle Y_{2}=SubWord(X_{3})} are used in AES-256 and 2 subexpressions Y 1 = R o t W o r d ( S u b W o r d ( X 1 ) ) ⊕ r c o n {\displaystyle Y_{1}=RotWord(SubWord(X_{1}))\oplus rcon} and Y 3 = R o t W o r d ( S u b W o r d ( X 3 ) ) ⊕ r c o n {\displaystyle Y_{3}=RotWord(SubWord(X_{3}))\oplus rcon} are used in AES-128, AES-192, AES-256. /wiki/AES_key_schedule#The_key_schedule

  6. "Intel Product Specification Advanced Search". Intel ARK. https://ark.intel.com/Search/FeatureFilter?productType=processors

  7. Shimpi, Anand Lal. "The Sandy Bridge Review: Intel Core i7-2600K, i5-2500K and Core i3-2100 Tested". http://www.anandtech.com/show/4083/the-sandy-bridge-review-intel-core-i5-2600k-i5-2500k-and-core-i3-2100-tested/2

  8. "Intel Product Specification Comparison". http://ark.intel.com/compare/53415,63913,58667,53480,53481,53482,53483,53484,53485,53490,53491,53492,53416,53414

  9. "AES-NI support in TrueCrypt (Sandy Bridge problem)". 27 January 2022. http://forum.notebookreview.com/windows-os-software/582628-aes-ni-support-truecrypt-sandy-bridge-problem.html

  10. "Some products can support AES New Instructions with a Processor Configuration update, in particular, i7-2630QM/i7-2635QM, i7-2670QM/i7-2675QM, i5-2430M/i5-2435M, i5-2410M/i5-2415M. Please contact OEM for the BIOS that includes the latest Processor configuration update". http://ark.intel.com/products/52224

  11. "Intel Core i3-2115C Processor (3M Cache, 2.00 GHz) Product Specifications". http://ark.intel.com/products/68332/Intel-Core-i3-2115C-Processor-(3MB-Cache-2_00-GHz)

  12. "Intel Core i3-4000M Processor (3M Cache, 2.40 GHz) Product Specifications". http://ark.intel.com/products/75104/Intel-Core-i3-4000M-Processor-3M-Cache-2_40-GHz

  13. "Following Instructions". AMD. November 22, 2010. Archived from the original on November 26, 2010. Retrieved 2011-01-04. https://web.archive.org/web/20101126155830/http://blogs.amd.com/work/2010/11/22/following-instructions/

  14. Dan Anderson (2011). "SPARC T4 OpenSSL Engine". Oracle. Retrieved 2012-09-20. https://blogs.oracle.com/DanX/entry/sparc_t4_openssl_engine

  15. Richard Grisenthwaite (2011). "ARMv8-A Technology Preview" (PDF). ARM. Archived from the original (PDF) on 2018-06-10. Retrieved 2012-09-20. https://web.archive.org/web/20180610181021/https://www.arm.com/files/downloads/ARMv8_Architecture.pdf

  16. "AMD Geode LX Processor Family Technical Specifications". AMD. https://www.amd.com/us/products/embedded/processors/geode-lx/Pages/geode-lx-processor-family-technical-specifications.aspx

  17. "VIA Padlock Security Engine". VIA. Archived from the original on 2011-05-15. Retrieved 2011-11-14. https://web.archive.org/web/20110515073323/http://www.via.com.tw/en/initiatives/padlock/hardware.jsp#aes

  18. Cryptographic Hardware Accelerators on OpenWRT.org http://wiki.openwrt.org/doc/hardware/cryptographic.hardware.accelerators

  19. "VIA Eden-N Processors". VIA. Archived from the original on 2011-11-11. Retrieved 2011-11-14. https://web.archive.org/web/20111111212545/http://www.via.com.tw/en/products/processors/eden-n/

  20. "VIA C7 Processors". VIA. Archived from the original on 2007-04-19. Retrieved 2011-11-14. https://web.archive.org/web/20070419142654/http://www.via.com.tw/en/products/processors/c7-m/

  21. "Arm Architecture Reference Manual Armv8, for Armv8-A architecture profile". ARM. 22 January 2021. https://developer.arm.com/documentation/ddi0487/latest/

  22. "Security System/Crypto Engine driver status". sunxi.montjoie.ovh. http://sunxi.montjoie.ovh/

  23. Cryptographic Hardware Accelerators on OpenWRT.org http://wiki.openwrt.org/doc/hardware/cryptographic.hardware.accelerators

  24. "Linux Cryptographic Acceleration on an i.MX6" (PDF). Linux Foundation. February 2017. Archived from the original (PDF) on 2019-08-26. Retrieved 2018-05-02. https://web.archive.org/web/20190826043222/http://events17.linuxfoundation.org/sites/events/files/slides/2017-02%20-%20ELC%20-%20Hudson%20-%20Linux%20Cryptographic%20Acceleration%20on%20an%20MX6.pdf

  25. "Cryptographic module in Snapdragon 805 is FIPS 140-2 certified". Qualcomm. https://www.qualcomm.com/news/onq/2014/11/07/cryptographic-module-snapdragon-805-fips-140-2-certified

  26. "RK3128 - Rockchip Wiki". Rockchip wiki. Archived from the original on 2019-01-28. Retrieved 2018-05-02. https://web.archive.org/web/20190128135332/http://rockchip.wikidot.com/rk3128

  27. "The Samsung Exynos 7420 Deep Dive - Inside A Modern 14nm SoC". AnandTech. https://www.anandtech.com/show/9330/exynos-7420-deep-dive/2

  28. "Sipeed M1 Datasheet v1.1" (PDF). kamami.pl. 2019-03-06. Retrieved 2021-05-03. https://download.kamami.pl/p578357-Sipeed-M1-Datasheet-V1.1.pdf

  29. "ESP32 Series Datasheet" (PDF). www.espressif.com. 2021-03-19. Retrieved 2021-05-03. https://www.espressif.com/sites/default/files/documentation/esp32_datasheet_en.pdf

  30. "ESP32-C3 WiFi & BLE RISC-V processor is pin-to-pin compatible with ESP8266". CNX-Software. Retrieved 2020-11-22. https://www.cnx-software.com/2020/11/22/esp32-c3-wifi-ble-risc-v-processor-is-pin-to-pin-compatible-with-esp8266/

  31. "BL602-Bouffalo Lab (Nanjing) Co., Ltd". www.bouffalolab.com. Archived from the original on 2021-06-18. Retrieved 2021-05-03. https://web.archive.org/web/20210618105735/https://www.bouffalolab.com/bl602

  32. "Power ISA Version 2.07 B". Retrieved 2022-01-07. https://ibm.ent.box.com/s/jd5w15gz301s5b5dt375mshpq9c3lh4u

  33. "IBM System z10 cryptography". IBM. Archived from the original on August 13, 2008. Retrieved 2014-01-27. https://web.archive.org/web/20080813091048/http://www-03.ibm.com/systems/z/advantages/security/z10cryptography.html

  34. "Using the XMEGA built-in AES accelerator" (PDF). Retrieved 2014-12-03. http://www.atmel.com/Images/doc8106.pdf

  35. "Cavium Networks Launches Industry's Broadest Line of Single and Dual Core MIPS64-based OCTEON Processors Targeting Intelligent Next Generation Networks". Archived from the original on 2017-12-07. Retrieved 2016-09-17. https://web.archive.org/web/20171207224755/http://cavium.com/newsevents_OCTEONMIPS64.html

  36. P. Schmid and A. Roos (2010). "AES-NI Performance Analyzed". Tom's Hardware. Retrieved 2010-08-10. http://www.tomshardware.com/reviews/clarkdale-aes-ni-encryption,2538.html

  37. T. Krovetz, W. Dai (2010). "How to get fast AES calls?". Crypto++ user group. Retrieved 2010-08-11. https://groups.google.com/group/cryptopp-users/msg/a688203c2314ef08

  38. "Crypto++ 5.6.0 Pentium 4 Benchmarks". Crypto++ Website. 2009. Archived from the original on 19 September 2010. Retrieved 2010-08-10. http://www.cryptopp.com/benchmarks-p4.html

  39. "NonStop SSH Reference Manual". Retrieved 2020-04-09. https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=c04179776

  40. "NonStop cF SSL Library Reference Manual". Retrieved 2020-04-09. https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=c04833758

  41. "BackBox H4.08Tape Encryption Option". Retrieved 2020-04-09. https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=c04203925

  42. "Intel Advanced Encryption Standard Instructions (AES-NI)". Intel. March 2, 2010. Archived from the original on 7 July 2010. Retrieved 2010-07-11. https://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-aes-ni/

  43. "AES-NI enhancements to NSS on Sandy Bridge systems". 2012-05-02. Retrieved 2012-11-25. https://bugzilla.mozilla.org/show_bug.cgi?id=706024

  44. "System Administration Guide: Security Services, Chapter 13 Solaris Cryptographic Framework (Overview)". Oracle. September 2010. Retrieved 2012-11-27. http://docs.oracle.com/cd/E19253-01/816-4557/scf-1/index.html

  45. "FreeBSD 8.2 Release Notes". FreeBSD.org. 2011-02-24. Archived from the original on 2011-04-12. Retrieved 2011-12-18. https://web.archive.org/web/20110412153215/http://www.freebsd.org/releases/8.2R/relnotes.html

  46. OpenSSL: CVS Web Interface https://archive.today/20120707203035/http://cvs.openssl.org/fileview?f=openssl/CHANGES&v=1.1686

  47. "Cryptographic Backend (GnuTLS 3.6.14)". gnutls.org. Retrieved 2020-06-26. https://gnutls.org/manual/html_node/Cryptographic-Backend.html

  48. "AES-GCM in libsodium". libsodium.org. https://download.libsodium.org/doc/secret-key_cryptography/aead#aes-256-gcm

  49. "Hardware Acceleration". www.veracrypt.fr. https://www.veracrypt.fr/en/Hardware%20Acceleration.html

  50. "aes - The Go Programming Language". golang.org. Retrieved 2020-06-26. https://golang.org/pkg/crypto/aes/

  51. Shimpi, Anand Lal. "The Clarkdale Review: Intel's Core i5 661, i3 540 & i3 530". www.anandtech.com. Retrieved 2020-06-26. https://www.anandtech.com/show/2901

  52. "Bloombase StoreSafe Intelligent Storage Firewall". https://marketplace.intel.com/s/offering/a5b3b0000004dBTAAY/bloombase-storesafe-intelligent-storage-firewall

  53. "Vormetric Encryption Adds Support for Intel AES-NI Acceleration Technology". 15 May 2012. https://www.dbta.com/Editorial/News-Flashes/Vormetric-Encryption-Adds-Support-for-Intel-AES-NI-Acceleration-Technology-82614.aspx

  54. Saarinen, Markku-Juhani O. (17 April 2020). "mjosaarinen/sm4ni: Demonstration that AES-NI instructions can be used to implement the Chinese Encryption Standard SM4". GitHub. https://github.com/mjosaarinen/sm4ni

  55. Kivilinna, Jussi (2013). Block Ciphers: Fast Implementations on x86-64 Architecture (PDF) (M.Sc.). University of Oulu. pp. 33, 42. Retrieved 2017-06-22. http://jultika.oulu.fi/files/nbnfioulu-201305311409.pdf

  56. Yoo, Tae-Hee; Kivilinna, Jussi; Cho, Choong-Hee (2023). "AVX-Based Acceleration of ARIA Block Cipher Algorithm". IEEE Access. 11: 77403–77415. Bibcode:2023IEEEA..1177403Y. doi:10.1109/ACCESS.2023.3298026. https://doi.org/10.1109%2FACCESS.2023.3298026

  57. Kivilinna, Jussi (19 April 2023). "camellia-simd-aesni". GitHub. Newer x86-64 processors also support Galois Field New Instructions (GFNI) which allow implementing Camellia s-box more straightforward manner and yield even better performance. https://github.com/jkivilin/camellia-simd-aesni

  58. Wu, Hongjun; Preneel, Bart. "AEGIS: A Fast Authenticated Encryption Algorithm (v1.1)" (PDF). https://competitions.cr.yp.to/round3/aegisv11.pdf

  59. Denis, Frank. "The AEGIS Family of Authenticated Encryption Algorithms". cfrg.github.io. https://cfrg.github.io/draft-irtf-cfrg-aegis-aead/draft-irtf-cfrg-aegis-aead.html