Compact AES-based architecture for symmetric encryption, hash function, and random number generation

被引:9
|
作者
Laue, Ralf [1 ]
Kelm, Oliver [1 ]
Schipp, Sebastian [1 ]
Shoufan, Abdulhadi [1 ]
Huss, Sorin A. [1 ]
机构
[1] Tech Univ Darmstadt, Dept Comp Sci, Integrated Circuits & Syst Lab, Darmstadt, Germany
关键词
D O I
10.1109/FPL.2007.4380694
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Symmetric encryption, secure hashing, and random number generation are essential operations for many cryptographic applications. Realizations of these functions usually aim for high computational speed. For some applications, however, low resource usage is more important. Thus, this work presents a compact design for symmetric encryption, hash function, and Cryptographically Secure Random Number Generator. Its central element is a small AES-module, which is shared by all operations, leading to a lower resource usage than aggregated stand-alone solutions in previous work.
引用
收藏
页码:480 / 484
页数:5
相关论文
共 50 条
  • [21] Image Encryption Based on Pixel Transposition and Lehmer Pseudo Random Number Generation
    Kumar, Ranjan H. S.
    Safeeriya, Fathimath S. P.
    Shetty, Surendra
    Aithal, Ganesh
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 1188 - 1193
  • [22] An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing
    Wang, Hua
    Xia, Zhihua
    Fei, Jianwei
    Xiao, Fengjun
    IEEE ACCESS, 2020, 8 : 61138 - 61147
  • [23] RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function
    Liu Jian-dong
    Wang Ye-quan
    Zhang Xiao
    Shang Kai
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 919 - 922
  • [24] Pseudo Random Number Generator and Hash Function for Embedded Microprocessors
    Seo, Hwajeong
    Choi, Jongseok
    Kim, Hyunjin
    Park, Taehwan
    Kim, Howon
    2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2014, : 37 - 40
  • [25] A PLUG-IN-BASED ARCHITECTURE FOR RANDOM NUMBER GENERATION IN SIMULATION SYSTEMS
    Ewald, Roland
    Roessel, Johannes
    Himmelspach, Jan
    Uhrmacher, Adelinde M.
    2008 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2008, : 836 - 844
  • [26] AES-based BIST: self-test, test pattern generation and signature analysis
    Doulcier, M.
    Flottes, M. L.
    Rouzeyre, B.
    DELTA 2008: FOURTH IEEE INTERNATIONAL SYMPOSIUM ON ELECTRONIC DESIGN, TEST AND APPLICATIONS, PROCEEDINGS, 2008, : 314 - 321
  • [27] An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation
    Anand, Ravi
    Banik, Subhadeep
    Caforio, Andrea
    Fukushima, Kazuhide
    Isobe, Takanori
    Kiyomoto, Shisaku
    Liu, Fukang
    Nakano, Yuto
    Sakamoto, Kosei
    Takeuchi, Nobuyuki
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 229 - 248
  • [28] A low-area unified hardware architecture for the AES and the cryptographic hash function ECHO
    Beuchat, Jean-Luc
    Okamoto, Eiji
    Yamazaki, Teppei
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2011, 1 (02) : 101 - 121
  • [29] A low-area unified hardware architecture for the AES and the cryptographic hash function Grostl
    At, Nuray
    Beuchat, Jean-Luc
    Okamoto, Eiji
    San, Ismail
    Yamazaki, Teppei
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2017, 106 : 106 - 120
  • [30] Image Encryption Technique Based on Chaotic System and Hash Function
    Mishra, Manish
    Pandit, Shraddha
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND SYSTEMS (ICCCS'14), 2014, : 63 - 67