Scalable and Efficient Hardware Architectures for Authenticated Encryption in IoT Applications
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Khan, Safiullah | - |
dc.contributor.author | Lee, Wai-Kong | - |
dc.contributor.author | Hwang, Seong Oun | - |
dc.date.accessioned | 2021-07-19T02:40:52Z | - |
dc.date.available | 2021-07-19T02:40:52Z | - |
dc.date.created | 2021-02-01 | - |
dc.date.issued | 2021-07-15 | - |
dc.identifier.issn | 2327-4662 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/81710 | - |
dc.description.abstract | Internet of Things (IoT) is a key enabling technology, wherein sensors are placed ubiquitously to collect and exchange information with their surrounding nodes. Due to the inherent inter-connectivity, IoT devices are vulnerable to cyber-security attacks. To mitigate these vulnerabilities, cryptographic primitives can be employed, but they require significant computation, which restricts their adoption in IoT. Moreover, IoT systems have diverse requirements, ranging from high-throughput to the area constrained. This makes it hard to deploy appropriate security measures in a systematic manner. To address these issues, three generic implementation strategies (unrolled, round-based, and serialized) are proposed for developing highly efficient hardware architectures. They are applicable to all authenticated encryption schemes, and are lightweight and fast, compared to conventional public key encryption. In this paper, Ascon is implemented as an example based on those three strategies. (1) The unrolled architecture achieves throughput (TP) of 766.9 Mbps (Ascon-128) and 1389.2 Mbps (Ascon-128a), which are suitable for high-throughput IoT applications. (2) The round-based architecture achieves 0.153 (Ascon-128) and 0.244 (Ascon-128a) throughput-to-area ratio, which are respectively 73.8% and 40.2% better than state-of-the-art results. (3) A novel serialized implementation technique is proposed wherein the substitution-box (S-box) is processed in multiple-bit-per-cycle, in contrast to the conventional one-bit-per-cycle approach. The throughput of the two-bits-per-clock-cycle implementation is increased by 230.8% with only 36.8% additional hardware area. The proposed strategies allow us to scale the number of rounds (round-based) and bits-per-clock-cycle (serialized) to meet differing requirements in throughput and area which are demonstrated for smart city IoT applications. IEEE | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | - |
dc.relation.isPartOf | IEEE Internet of Things Journal | - |
dc.title | Scalable and Efficient Hardware Architectures for Authenticated Encryption in IoT Applications | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000670585100021 | - |
dc.identifier.doi | 10.1109/JIOT.2021.3052184 | - |
dc.identifier.bibliographicCitation | IEEE Internet of Things Journal, v.8, no.14, pp.11260 - 112785 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85099725313 | - |
dc.citation.endPage | 112785 | - |
dc.citation.startPage | 11260 | - |
dc.citation.title | IEEE Internet of Things Journal | - |
dc.citation.volume | 8 | - |
dc.citation.number | 14 | - |
dc.contributor.affiliatedAuthor | Khan, Safiullah | - |
dc.contributor.affiliatedAuthor | Lee, Wai-Kong | - |
dc.contributor.affiliatedAuthor | Hwang, Seong Oun | - |
dc.type.docType | Article in Press | - |
dc.subject.keywordAuthor | Ascon | - |
dc.subject.keywordAuthor | Authenticated Encryption | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Encryption | - |
dc.subject.keywordAuthor | Field programmable gate arrays | - |
dc.subject.keywordAuthor | FPGA | - |
dc.subject.keywordAuthor | Hardware | - |
dc.subject.keywordAuthor | Internet of Things | - |
dc.subject.keywordAuthor | Lightweight Cryptography | - |
dc.subject.keywordAuthor | NIST. | - |
dc.subject.keywordAuthor | Security | - |
dc.subject.keywordAuthor | Smart cities | - |
dc.subject.keywordPlus | Architecture | - |
dc.subject.keywordPlus | Authentication | - |
dc.subject.keywordPlus | Clocks | - |
dc.subject.keywordPlus | Public key cryptography | - |
dc.subject.keywordPlus | Authenticated encryption | - |
dc.subject.keywordPlus | Authenticated encryption scheme | - |
dc.subject.keywordPlus | Cryptographic primitives | - |
dc.subject.keywordPlus | Enabling technologies | - |
dc.subject.keywordPlus | Generic implementation | - |
dc.subject.keywordPlus | Implementation techniques | - |
dc.subject.keywordPlus | Internet of Things (IOT) | - |
dc.subject.keywordPlus | Substitution Box(S Box) | - |
dc.subject.keywordPlus | Internet of things | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.