781 Hits in 8.6 sec

Implementation of Symmetric Algorithms on a Synthesizable 8-Bit Microcontroller Targeting Passive RFID Tags [chapter]

Thomas Plos, Hannes Groß, Martin Feldhofer
2011 Lecture Notes in Computer Science  
The vision of the secure Internet-of-Things is based on the use of security-enhanced RFID technology. In this paper, we describe the implementation of symmetric-key primitives on passive RFID tags.  ...  The architecture is flexible in terms of used program size and the number of used registers which allows an evaluation of various algorithms concerning their required resources.  ...  P6/26 BCRYPT of the Belgian State (Belgian Science Policy).  ... 
doi:10.1007/978-3-642-19574-7_8 fatcat:sqhe5icgwneu5czlufhkmllade

A Survey of Lightweight-Cryptography Implementations

Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, Leif Uhsadel
2007 IEEE Design & Test of Computers  
On the other hand, it's possible to design a secure, low-cost hardware implementation with the drawback of limited performance.  ...  For hardware implementations, we focus on the required chip size and the number of clock cycles.  ...  Acknowledgments We thank Andrey Bogdanov, Lars Knudsen, Gregor Leander, Matt Robshaw, Yannick Seurin, and Charlotte Vikkelsoe for their contributions to the development of Present.  ... 
doi:10.1109/mdt.2007.178 fatcat:fjxp6gyhtbe23d7yruq6zvgbwa

Feasibility of PKC in resource-constrained wireless sensor networks

Al-Sakib Khan Pathan, Choong Seon Hong
2008 2008 11th International Conference on Computer and Information Technology  
Here, we talk about the notion of public key cryptography in WSN, its applicability, challenges in its implementation, and present a detailed study of the significant works on PKC in WSN.  ...  In this paper we present a detailed review of the works on public key cryptography (PKC) in wireless sensor networks (WSNs).  ...  Their implementation mainly focused on efficient architectures that execute the public key algorithms using minimal resources.  ... 
doi:10.1109/iccitechn.2008.4803120 fatcat:ubg6wrnqljek3kzuxhdj5ay4ku

A Survey on RISC-V Security: Hardware and Architecture [article]

Tao Lu
2021 arXiv   pre-print
For decades, these processors were mainly based on the Arm instruction set architecture (ISA).  ...  This paper summarizes the representative security mechanisms of RISC-V hardware and architecture. Based on our survey, we predict the future research and development directions of RISC-V security.  ...  The results show that the instruction extension can accelerate the lightweight encryption algorithm by 33 to 138× at a reasonable hardware cost.  ... 
arXiv:2107.04175v1 fatcat:hr6avyprj5dvpav2pvnmfmvg2a

A Survey of Cryptographic Primitives and Implementations for Hardware-Constrained Sensor Network Nodes

Rodrigo Roman, Cristina Alcaraz, Javier Lopez
2007 Journal on spesial topics in mobile networks and applications  
Although the cryptographic primitives are usually complex, in terms of computational overhead and memory usage, the hardware resources available in the devices should be able to minimize their impact on  ...  In a wireless sensor network environment, a sensor node is extremely constrained in terms of hardware due to factors such as maximizing lifetime and minimizing physical size and overall cost.  ...  The first author has been funded by the Ministry of Education and Science of Spain under the "Programa Nacional de Formacion de Profesorado Universitario".  ... 
doi:10.1007/s11036-007-0024-2 fatcat:zaqwex2ds5frfa4pjw7klclpvu

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines [chapter]

Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer
2011 Lecture Notes in Computer Science  
The implementation of ECDSA is based on the recommended Fp192 NIST elliptic curve and AES uses 128-bit keys.  ...  In this paper, we present a hardware implementation of a low-resource cryptographic processor that provides both digital signature generation using ECDSA and encryption/decryption services using AES.  ...  of the Belgian State (Belgian Science Policy).  ... 
doi:10.1007/978-3-642-21040-2_10 fatcat:dlxkhclihnf3xk2cbv7flga2e4

Lightweight Cryptography for Embedded Systems – A Comparative Analysis [chapter]

Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Konstantinos Rantos
2014 Lecture Notes in Computer Science  
This paper provides a comparative analysis of lightweight cryptographic algorithms applicable to such devices, presenting recent advances in the field for symmetric and asymmetric algorithms as well as  ...  There is a variety of cryptographic mechanisms which can be used to safeguard the confidentiality and integrity of stored and transmitted information.  ...  For ultralightweight and low-cost devices the key establishment mechanisms based only on symmetric cryptography can be applied.  ... 
doi:10.1007/978-3-642-54568-9_21 fatcat:parncxw2ynhfzpxnx22iwo52ga

Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography

Thomas Plos, Michael Hutter, Martin Feldhofer, Maksimiljan Stiglic, Francesco Cavaliere
2013 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
) 8-bit microcontroller, a framing logic for data transmission, a memory unit, and a crypto unit.  ...  As security features, it supports encryption and decryption using the Advanced Encryption Standard (AES-128), the generation of digital signatures using the Elliptic Curve Digital Signature Algorithm (  ...  ACKNOWLEDGMENT The authors would like to thank Johannes Wolkerstorfer, Manfred Aigner, Jörn-Marc Schmidt, and Nikolaus Ribic for their contributions within this project and for very fruitful discussions  ... 
doi:10.1109/tvlsi.2012.2227849 fatcat:sahsybcl4bdb3iztme5knjhv7a

An ECDSA Processor for RFID Authentication [chapter]

Michael Hutter, Martin Feldhofer, Thomas Plos
2010 Lecture Notes in Computer Science  
The proposed architecture enhances the state-of-the-art in designing a low-resource ECDSA-enabled RFID hardware implementation.  ...  In the last few years, a lot of research has been made to bring asymmetric cryptography on low-cost RFID tags.  ...  The authors would like to thank Johannes Wolkerstorfer and Marcel Medwed for their valuable inputs and discussions.  ... 
doi:10.1007/978-3-642-16822-2_16 fatcat:qzeo6u35ejhpbh5gabpsnnlnhq

Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation

Sudip Maitra, Kumar Yelamarthi
2019 Sensors  
is a major constraint, whereas the XTEA algorithm is ideal for resource constrained microcontrollers.  ...  Experimental results from implementation in multiple IoT applications has shown that utilizing the AES algorithm with a hardware accelerator utilizes the least amount of energy and is ideal where timing  ...  Acknowledgments: Will Falkner helped with 3D designs and Mark Blackmer helped with printing the cases. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s19112484 fatcat:3qkf3fjgsjgndchilizwc25bjq


Petro Klimushin, Tetiana Solianyk, Tetiana Kolisnyk, Oleksandr Mozhaiv
2021 Advanced Information Systems  
The peculiarity of the scheme of exchange of symmetric session encryption keys of messages are: use of a secret key stored on the side of the host and the client; the determination of the session key is  ...  The simplest authentication scheme without storing a secret key on the host side, which does not imply the use of a cryptographic chip on the host side, provides a fast symmetric authentication process  ...  substitution tables; 2) Hardware implementationused extensions of the command system and special instructions for modern microprocessors, which allow performing some hardware operations, which significantly  ... 
doi:10.20998/2522-9052.2021.3.14 fatcat:yrjhfrfu2femtiw4eyocroawxe

Security Empowered System-on-Chip Selection for Internet of Things

Ramesh Krishnamoorthy, Kalimuthu Krishnan
2021 Intelligent Automation and Soft Computing  
System-on-chip (SoC) devices consist of one or more CPUs through wide-ranging inbuilt peripherals for designing a system with less cost.  ...  elliptic curve cryptography (ECC), MX algorithm, and the secure hash algorithm (SHA-256) are compared to identify the suitable algorithm for implementation of on-chip security.  ...  Funding Statement: The authors received no specific funding for this study. Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding this study.  ... 
doi:10.32604/iasc.2021.018560 fatcat:xfpmxdnlvrajtlswgibaxjohfm

Cryptographic System on a Chip based on Actel ARM7 Soft-Core with Embedded True Random Number Generator

Milos Drutarovsky, Michal Varchola
2008 2008 11th IEEE Workshop on Design and Diagnostics of Electronic Circuits and Systems  
The paper introduces a cryptographic System on a Chip (SoC) implementation based on recent Actel nonvolatile FPGA Fusion chip with embedded ARM7 soft-core processor.  ...  High flexibility of the SoC is based on efficient software implementation of main cryptographic primitives (AES, ECC, RSA, SHA) in soft-core.  ...  The Round Keys are derived from the Cipher Key by means of the key schedule algorithm (e.g., for a block length of 128 bits and 10 rounds, 1408 Round Key bits are used).  ... 
doi:10.1109/ddecs.2008.4538778 dblp:conf/ddecs/DrutarovskyV08 fatcat:vplpxq4oizhyxclqynwbvl4j5m

Implementation of Secure Communication via the RF Module for Data Acquisition

Juraj Dudak, Gabriel Gaspar, Pavol Tanuska
2019 Journal of Sensors  
The main topic of the article is the design and implementation of a secure one-way communication channel.  ...  In case of industrial use, it may be a sensory system at a point where it is not possible to implement a fixed line, or it is necessary to repeatedly change the position, respectively, the location of  ...  Acknowledgments This work was supported in part by VEGA through the Holistic Approach of Knowledge Discovery from Production Data in Compliance with Industry 4.0 Concept Project under Grant 1/0272/18.  ... 
doi:10.1155/2019/7810709 fatcat:ddezeq3t7vd25of6l3l4y3sd7i

An energy-efficient reconfigurable public-key cryptography processor

J. Goodman, A.P. Chandrakasan
2001 IEEE Journal of Solid-State Circuits  
Measured performance and energy efficiency indicate a comparable level of performance to previously reported dedicated hardware implementations, while providing all of the flexibility of a software-based  ...  The ever-increasing demand for security in portable energy-constrained environments that lack a coherent security architecture has resulted in the need to provide energy-efficient algorithm-agile cryptographic  ...  ACKNOWLEDGMENT The authors would like to thank the National Semiconductor Corporation for providing fabrication facilities.  ... 
doi:10.1109/4.962304 fatcat:roq2alvqwfcrbbtrpuy37bnyl4
« Previous Showing results 1 — 15 out of 781 results