Low Area and Low Power Implementation for Competition for Authenticated Encryption, Security, Applicability, and Robustness Authenticated Ciphers

被引:2
|
作者
Abbas, Amr [1 ]
Mostafa, Hassan [2 ,3 ]
Mohieldin, Ahmed Nader [3 ]
机构
[1] Mentor Graph Corp, IC Verificat Solut, Cairo 11843, Egypt
[2] Zewail City Sci & Technol, Nanotechnol Program, Cairo 14021, Egypt
[3] Cairo Univ, Elect & Commun Engn Dept, Giza 12613, Egypt
关键词
Authenticated Cipher; CAESAR; FPGA; Lightweight; Power; Energy;
D O I
10.1166/jolpe.2019.1593
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Authenticated Encryption (AE) and Authenticated Encryption with Associated Data (AEAD) play a significant role in cryptography as they simultaneously provide confidentiality, integrity, and authenticity assurances on the data. The Competition for Authenticated Encryption, Security, Applicability, and Robustness (CAESAR) seeks optimal authenticated ciphers based on multiple criteria, including security, performance, area, and energy-efficiency. Low power consumption is one of the main requirements for any chip design targeting the Internet of Things (IoT) applications. In this research paper, low area and low power implementations of selected ciphers from the CAESAR candidates namely NORX, Tiaoxin, SILC, COLM, and JAMBU are provided and Implemented in both Application Specific Integrated Circuits (ASIC) and Field Programmable Gate Arrays (FPGA). For FPGA Implementations a reduction in area with an average of 32% and a reduction in dynamic power with an average of 56% are achieved compared to their corresponding high-speed architectures. While for ASIC Implementations a reduction in area with an average of 36% and a reduction in dynamic power with an average of 43% are achieved compared to their corresponding high-speed architectures. Moreover, throughput (TP) decreases by an average of 70%.
引用
收藏
页码:104 / 114
页数:11
相关论文
共 50 条
  • [21] An Implementation of Area Optimized Low Power MAC
    Babu, P. Ashok
    JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (03): : 112 - 123
  • [22] A fast and secure elliptic curve based authenticated key agreement protocol for low power mobile communications
    Abi-Char, Pierre E.
    Mhamed, Abdallah
    El-Hassan, Bachar
    NGMAST 2007: 2007 INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES, 2007, : 235 - +
  • [23] Hardware Low Power implementation of Attribute-Based Encryption
    Abdel-Aziz, Mohamed M.
    Abdel-Hamid, Amr T.
    2016 28TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM 2016), 2016, : 273 - 276
  • [24] An ASIC Implementation of Low Area AES Encryption Core for Wireless Networks
    Van-Lan Dao
    Anh-Thai Nguyen
    Van-Phuc Hoang
    Tuan-Anh Tran
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, MANAGEMENT AND TELECOMMUNICATIONS (COMMANTEL), 2015, : 99 - 102
  • [25] Distributed Logic Encryption: Essential Security Requirements and Low-Overhead Implementation
    Afsharmazayejani, Raheel
    Sayadi, Hossein
    Rezaei, Amin
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 127 - 131
  • [26] A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 113 - 123
  • [27] Asynchronous low power VLSI implementation of the International Data Encryption Algorithm
    Sklavos, N
    Koufopavlou, O
    ICECS 2001: 8TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS I-III, CONFERENCE PROCEEDINGS, 2001, : 1425 - 1428
  • [28] Low-power implementation of an encryption/decryption system with asynchronous techniques
    Sklavos, N
    Papakonstantinou, A
    Theoharis, S
    Koufopavlou, O
    VLSI DESIGN, 2002, 15 (01) : 455 - 468
  • [29] Performance Analysis of Advanced Encryption Standard for Low power and Area Applications
    Sharma, T. Manoj
    Thilagavathy, R.
    2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT 2013), 2013, : 967 - 972
  • [30] A Low Area FPGA Implementation of Reversible Gate Encryption with Heterogeneous Key Generation
    K. Saranya
    K. N. Vijeyakumar
    Circuits, Systems, and Signal Processing, 2021, 40 : 3836 - 3865