Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers

被引:2
|
作者
Abbas, Amr [1 ]
Mostafa, Hassan [2 ,3 ]
Mohieldin, Ahmed Nader [3 ]
机构
[1] Mentor Graph Corp, IC Verificat Solut, Cairo 11843, Egypt
[2] Zewail City Sci & Technol, Nanotechnol Program, Cairo 14021, Egypt
[3] Cairo Univ, Elect & Commun Engn Dept, Giza 12613, Egypt
关键词
Authenticated Cipher; CAESAR; FPGA; Lightweight; Power; Energy;
D O I
10.1166/jolpe.2019.1593
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Authenticated Encryption (AE) and Authenticated Encryption with Associated Data (AEAD) play a significant role in cryptography as they simultaneously provide confidentiality, integrity, and authenticity assurances on the data. The Competition for Authenticated Encryption, Security, Applicability, and Robustness (CAESAR) seeks optimal authenticated ciphers based on multiple criteria, including security, performance, area, and energy-efficiency. Low power consumption is one of the main requirements for any chip design targeting the Internet of Things (IoT) applications. In this research paper, low area and low power implementations of selected ciphers from the CAESAR candidates namely NORX, Tiaoxin, SILC, COLM, and JAMBU are provided and Implemented in both Application Specific Integrated Circuits (ASIC) and Field Programmable Gate Arrays (FPGA). For FPGA Implementations a reduction in area with an average of 32% and a reduction in dynamic power with an average of 56% are achieved compared to their corresponding high-speed architectures. While for ASIC Implementations a reduction in area with an average of 36% and a reduction in dynamic power with an average of 43% are achieved compared to their corresponding high-speed architectures. Moreover, throughput (TP) decreases by an average of 70%.
引用
收藏
页码:104 / 114
页数:11
相关论文
共 50 条
  • [1] Low Area and Low Power Implementation for CAESAR Authenticated Ciphers
    Abbas, Amr
    Mostafa, Hassan
    Mohieldin, Ahmed Nader
    2018 NEW GENERATION OF CAS (NGCAS), 2018, : 49 - 52
  • [2] Low Cost Implementation of Authenticated Encryption Using Spongift
    Parthasarathy, R.
    Saravanan, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 136 (04) : 2479 - 2493
  • [3] A Low-Area ASIC Implementation of AEGIS128-a Fast Authenticated Encryption Algorithm
    Schilling, Robert
    Jelinek, Manuel
    Ortoff, Markus
    Unterluggauer, Thomas
    PROCEEDINGS OF THE 22ND AUSTRIAN WORKSHOP ON MICROELECTRONICS (AUSTROCHIP 2014), 2014, : 29 - 33
  • [4] Accelerated Software Implementation of Authenticated Encryption Stream Ciphers for High Speed Applications
    Taha, Sara
    Mostafa, Hassan
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 27 - 31
  • [5] AUTHENTICATED ENCRYPTION SCHEMES WITH LOW COMMUNICATION COSTS
    HORSTER, P
    MICHELS, M
    PETERSEN, H
    ELECTRONICS LETTERS, 1994, 30 (15) : 1212 - 1213
  • [6] Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
    Fan Zhang
    Zi-yuan Liang
    Bo-lin Yang
    Xin-jie Zhao
    Shi-ze Guo
    Kui Ren
    Frontiers of Information Technology & Electronic Engineering, 2018, 19 : 1475 - 1499
  • [7] Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition
    Zhang, Fan
    Liang, Zi-yuan
    Yang, Bo-lin
    Zhao, Xin-jie
    Guo, Shi-ze
    Ren, Kui
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2018, 19 (12) : 1475 - 1499
  • [8] ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode
    Chakraborti, Avik
    Datta, Nilanjan
    Jha, Ashwin
    Mancillas-Lopez, Cuauhtemoc
    Nandi, Mridul
    Sasaki, Yu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 : 350 - 389
  • [9] An Area-Optimized Serial Implementation of ICEPOLE Authenticated Encryption Schemes
    Tempelmeier, Michael
    De Santis, Fabrizio
    Kaps, Jens-Peter
    Sigl, Georg
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), 2016, : 49 - 54
  • [10] LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (04) : 1 - 38