Journal ArticleDOI
Energy scalable universal hashing
TLDR
A variation on NH called WH is used, which reaches optimally in the sense that it is universal with half the hash length of NH and it achieves perfect serialization in hardware implementation, and introduces a powerful method for scaling WH according to specific energy and power consumption requirements.Abstract:
Message authentication codes (MACs) are valuable tools for ensuring the integrity of messages. MACs may be built around a universal hash function (NH) which was explored in the construction of UMAC. In this paper, we use a variation on NH called WH. WH reaches optimally in the sense that it is universal with half the hash length of NH and it achieves perfect serialization in hardware implementation. We achieved substantial power savings of up to 59 percent and a speedup of up to 7.4 times over NH. Moreover, we show how the technique of multihashing and the Toeplitz approach can be combined to reduce the power and energy consumption even further while maintaining the same security level with a very slight increase in the amount of the key material. At low frequencies, the power and energy reductions are achieved simultaneously while keeping the hashing time constant. We developed formulae for estimation of the leakage and dynamic power consumptions as well as the energy consumption based on the frequency and the Toeplitz parameter t. We introduce a powerful method for scaling WH according to specific energy and power consumption requirements. Our implementation of WH-16 consumes only 2.95 /spl mu/W at 500 kHz. It can therefore be integrated into a self-powered device.read more
Citations
More filters
Book ChapterDOI
FPGA Intrinsic PUFs and Their Use for IP Protection
TL;DR: New protocols for the IP protection problem on FPGAs are proposed and the first construction of a PUF intrinsic to current FPGA based on SRAM memory randomness present on current FFPAs is provided.
Book ChapterDOI
Efficient Helper Data Key Extractor on FPGAs
TL;DR: This paper presents for the first time efficient implementations of fuzzy extractors on FPGAs where the efficiency is measured in terms of required hardware resources.
Proceedings ArticleDOI
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks
TL;DR: In this article, a modification of the Hopper and Blum (HB) authentication protocol, HB++, has been proposed to thwart Gilbert, Robshaw and Sibert's attack.
Proceedings ArticleDOI
Physical Unclonable Functions and Public-Key Crypto for FPGA IP Protection
TL;DR: New protocols for the IP protection problem on FPGAs based on public-key (PK) cryptography are proposed, the advantages and costs of such an approach are analyzed, and a PUF intrinsic to current FPG as based on SRAM properties is described.
Journal ArticleDOI
Blockchain for smart cities: A review of architectures, integration trends and future research directions
Bharat Bhushan,Aditya Khamparia,K. Martin Sagayam,Sudhir Kumar Sharma,Mohd Abdul Ahad,Narayan C. Debnath +5 more
TL;DR: This paper presents the state-of-the-art blockchain technology to solve the security issues of smart cities and surveys the utility of blockchain in various smart communities such as healthcare, transportation, smart grid, supply chain management, financial systems and data center networks.
References
More filters
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI
Universal classes of hash functions
TL;DR: An input independent average linear time algorithm for storage and retrieval on keys that makes a random choice of hash function from a suitable class of hash functions.
Proceedings ArticleDOI
Next century challenges: mobile networking for “Smart Dust”
TL;DR: This work reviews the key elements of the emergent technology of “Smart Dust” and outlines the research challenges they present to the mobile networking and systems community, which must provide coherent connectivity to large numbers of mobile network nodes co-located within a small volume.
Journal ArticleDOI
New hash functions and their use in authentication and set equality
TL;DR: Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.
Book
Computer Arithmetic: Algorithms and Hardware Designs
TL;DR: An indispensable resource for instruction, professional development, and research, Computer Arithmetic: Algorithms and Hardware Designs, Second Edition combines broad coverage of the underlying theories of computer arithmetic with numerous examples of practical designs, worked-out examples, and a large collection of meaningful problems.