scispace - formally typeset
Journal ArticleDOI

Energy scalable universal hashing

Jens-Peter Kaps, +2 more
- 01 Dec 2005 - 
- Vol. 54, Iss: 12, pp 1484-1495
TLDR
A variation on NH called WH is used, which reaches optimally in the sense that it is universal with half the hash length of NH and it achieves perfect serialization in hardware implementation, and introduces a powerful method for scaling WH according to specific energy and power consumption requirements.
Abstract
Message authentication codes (MACs) are valuable tools for ensuring the integrity of messages. MACs may be built around a universal hash function (NH) which was explored in the construction of UMAC. In this paper, we use a variation on NH called WH. WH reaches optimally in the sense that it is universal with half the hash length of NH and it achieves perfect serialization in hardware implementation. We achieved substantial power savings of up to 59 percent and a speedup of up to 7.4 times over NH. Moreover, we show how the technique of multihashing and the Toeplitz approach can be combined to reduce the power and energy consumption even further while maintaining the same security level with a very slight increase in the amount of the key material. At low frequencies, the power and energy reductions are achieved simultaneously while keeping the hashing time constant. We developed formulae for estimation of the leakage and dynamic power consumptions as well as the energy consumption based on the frequency and the Toeplitz parameter t. We introduce a powerful method for scaling WH according to specific energy and power consumption requirements. Our implementation of WH-16 consumes only 2.95 /spl mu/W at 500 kHz. It can therefore be integrated into a self-powered device.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book ChapterDOI

FPGA Intrinsic PUFs and Their Use for IP Protection

TL;DR: New protocols for the IP protection problem on FPGAs are proposed and the first construction of a PUF intrinsic to current FPGA based on SRAM memory randomness present on current FFPAs is provided.
Book ChapterDOI

Efficient Helper Data Key Extractor on FPGAs

TL;DR: This paper presents for the first time efficient implementations of fuzzy extractors on FPGAs where the efficiency is measured in terms of required hardware resources.
Proceedings ArticleDOI

HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks

TL;DR: In this article, a modification of the Hopper and Blum (HB) authentication protocol, HB++, has been proposed to thwart Gilbert, Robshaw and Sibert's attack.
Proceedings ArticleDOI

Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection

TL;DR: New protocols for the IP protection problem on FPGAs based on public-key (PK) cryptography are proposed, the advantages and costs of such an approach are analyzed, and a PUF intrinsic to current FPG as based on SRAM properties is described.
Journal ArticleDOI

Blockchain for smart cities: A review of architectures, integration trends and future research directions

TL;DR: This paper presents the state-of-the-art blockchain technology to solve the security issues of smart cities and surveys the utility of blockchain in various smart communities such as healthcare, transportation, smart grid, supply chain management, financial systems and data center networks.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

Universal classes of hash functions

TL;DR: An input independent average linear time algorithm for storage and retrieval on keys that makes a random choice of hash function from a suitable class of hash functions.
Proceedings ArticleDOI

Next century challenges: mobile networking for “Smart Dust”

TL;DR: This work reviews the key elements of the emergent technology of “Smart Dust” and outlines the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume.
Journal ArticleDOI

New hash functions and their use in authentication and set equality

TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.
Book

Computer Arithmetic: Algorithms and Hardware Designs

TL;DR: An indispensable resource for instruction, professional development, and research, Computer Arithmetic: Algorithms and Hardware Designs, Second Edition combines broad coverage of the underlying theories of computer arithmetic with numerous examples of practical designs, worked-out examples, and a large collection of meaningful problems.