scispace - formally typeset
Open AccessJournal ArticleDOI

FPGA Implementation and Analysis of the Block Cipher Mode Architectures for the PRESENT Light Weight Encryption Algorithm

Reads0
Chats0
TLDR
The field Programmable Gate Array implementations of the different block cipher mode architectures of the ISO standardized light weight block cipher PRESENT demonstrates the high speed performance of the cipher in encryption/decryption of data as blocks and streams.
Abstract
Objective: This paper presents the Field Programmable Gate Array (FPGA) implementations of the different block cipher mode architectures of the ISO standardized light weight block cipher PRESENT, designed for resource constrained devices. Methods/ Statistical Analysis: The performance evaluations compare the implementations of the different block cipher modes, namely Electronic Code Book (ECB) mode, Cipher Block Chaining (CBC) mode, Cipher Feedback Mode (CFB), Output Feed Back Mode (OFB) and CounTeR (CTR) mode for the PRESENT cipher. The throughput of encryption of three successive 64 bit blocks of data ranges from 565.312Mbps to 574.784Mbps for the modes other than the cipher feedback mode in the Spartan-3 FPGA. The throughput for providing confidentiality through encryption in the cipher feedback mode arrives as 68.912 Mbps, 155.392Mbps and 300.8 Mbps for a 64 bit block of data for the input streams of size 8 bits, 16 bits and 32 bits respectively. Findings: The throughput of the block cipher mode hardware architectures of the light weight cipher PRESENT demonstrates the high speed performance of the cipher in encryption/decryption of data as blocks and streams. Application/ Improvement: The significance of the proposed work is to know the hardware performance of the different modes of operation for the light weight block cipher PRESENT. The performance estimation of the block cipher modes operations of the PRESENT cipher definition in hardware have been carried out for the first time.

read more

Citations
More filters
Journal ArticleDOI

Internet of Things: A Scientometric Review

TL;DR: A scientometric review about IoT over a data set of 19,035 documents published over a period of 15 years in two main scientific databases (Clarivate Web of Science and Scopus) is developed to perform quantitative analysis of this data set.
Book ChapterDOI

Time Synchronization with Channel Hopping Scheme for LoRa Networks

TL;DR: A novel time synchronization scheme for radically reducing usage of existing Aloha type protocol that handles energy consumption and service quality and the channel hopping scheme for a real-world deployed peer to peer (P2P) model using commodity hardware is introduced.
Journal Article

CWC: A high-performance conventional authenticated encryption mode

TL;DR: CWC as mentioned in this paper is a new block cipher mode of operation for protecting both the privacy and the authenticity of encapsulated data, which is the first such mode having all five of the following properties: provable security, parallelizability, high performance in hardware and no intellectual property concerns.
Journal ArticleDOI

Synchronization and efficient channel hopping for power efficiency in LoRa networks: A comprehensive study

TL;DR: A novel time synchronization scheme for radically reducing the usage of existing Aloha type protocol that handles energy consumption and service quality and a channel hopping scheme that integrates cryptographic channel selection with the time notion are introduced.
Proceedings ArticleDOI

Reconfigurable Module of Multi-mode AES Cryptographic Algorithms for AP SoCs

TL;DR: This article implements the AES with three different key lengths and different block cipher modes using High-Level Synthesis (HLS), and shows a possible occurrence to implement partial reconfiguration of multi-mode AES crypto algorithms in different configurations of AP SoCs during run-time.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Proceedings ArticleDOI

OCB: a block-cipher mode of operation for efficient authenticated encryption

TL;DR: It is proved OCB secure, quantifying the adversary's ability to violate the mode's privacy or authenticity in terms of the quality of its block cipher as a pseudorandom permutation (PRP) or as a strong PRP, respectively.
Book ChapterDOI

The security and performance of the galois/counter mode (GCM) of operation

TL;DR: GCM is shown to be the most efficient mode of operation for high speed packet networks, by using a realistic model of a network crypto module and empirical data from studies of Internet traffic in conjunction with software experiments and hardware designs.

SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques

TL;DR: This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR).
Book ChapterDOI

CWC: A High-Performance Conventional Authenticated Encryption Mode

TL;DR: CWC as discussed by the authors is a new block cipher mode of operation for protecting both the privacy and the authenticity of encapsulated data, which is the first such mode having all five of the following properties: provable security, parallelizability, high performance in hardware and no intellectual property concerns.
Related Papers (5)