Hardware Implementation of Aes-ccm for Robust Secure Wireless Network

نویسندگان

  • Arshad Aziz
  • Nassar Ikram
چکیده

Fast and secure implementations of cryptographic algorithms are essential for the realisation of any real time communication system. Cryptographic transformations are computationally intensive and therefore, strongly influence the performance of enabling crypto device. The choice of development platforms for embedding cryptographic applications is made considering the power and speed besides obviously the cost. With the ever increasing computational power vis-à-vis decreasing costs, reconfigurable devices like Field Programmable Gate Array (FPGAs) offer viable avenue for embedding cryptographic applications. Because of outperforming merits which distinguish FPGAs from other development platforms, these are increasing being deployed in a number of applications. This paper focuses on efficient implementation of secure wireless paradigm. As an aftermath of published weaknesses and vulnerabilities in Wired Equivalent Privacy (WEP), IEEE 802.11 interim security solution based on Temporal Key Integrity Protocol (TKIP) accommodates the existing WEP hardware by upgrading the software or firmware. However, the proposed long-term security solution is based on Advanced Encryption Standard (AES) CCM (Counter Mode, Cipher Block Chaining, Message Authentication Code), which definitely entails hardware upgradation. Through this work, manifestation of cryptographic implementation required to address the long term security solution for Robust Secure Wireless Network (RSN) based on fast, efficient and low power FPGA has been demonstrated. Computational intensive processes are therefore, offloaded from the main processor thus enabling achievement of secure high speed wireless connectivity. The Design utilizes low cost and low power Spartan-3 FPGA, producing a throughput of 2699 Mpbs using 10 Block RAM, 481 Slices and throughput per area of 5.6 Mbps/Slice.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CCMP Advanced Encryption Standard Cipher For Wireless Local Area Network (IEEE 802.11i): A Comparison with DES and RSA

Corresponding Author: Velayutham, R. Einstein College of Engineering, Tirunelveli, Tamilnadu, India Email: [email protected] Abstract: The comparative analysis of the renowned cryptographic algorithms AES, DES and RSA. The Rijndael algorithm was adapted as Advanced Encryption Standard (AES) algorithm, to Data Encryption algorithm (DES), which have been in the security standards since lon...

متن کامل

Efficient hardware architecture for the AES-CCM protocol of the IEEE 802.11i standard

Applications of wireless communications networks are emerging continuously. To offer a good level of security in these applications, new standards for wireless communications propose solutions based on cryptographic algorithms working on special modes of operation. This work presents a custom hardware architecture for the AES-CCM Protocol (AES-CCMP) which is the basis for the security architect...

متن کامل

An FPGA-based AES-CCM Crypto Core For IEEE 802.11i Architecture

The widespread adoption of IEEE 802.11 wireless networks has brought its security paradigm under active research. One of the important research areas in this field is the realization of fast and secure implementations of cryptographic algorithms. Under this work, such an implementation has been done for Advanced Encryption Standard (AES) on fast, efficient and low power Field Programmable Gate ...

متن کامل

AES Implementation and Performance Evaluation on 8-bit Microcontrollers

The sensor network is a network technique for the implementation of Ubiquitous computing environment. It is wireless network environment that consists of the many sensors of lightweight and low-power. Though sensor network provides various capabilities, it is unable to ensure the secure authentication between nodes. Eventually it causes the losing reliability of the entire network and many secu...

متن کامل

CFA based SBOX and Modified Mixcolumn Implementation of 8 Bit Datapath for AES

Secure data transmission is very important in any communication systems. Network Security provides many techniques for efficient data transmission through unprotected network. Cryptography provides a method for securing the transmission of information by the process of encryption. Encryption converts the message in to unreadable form (Cipher Text) . Decryption converts this Cipher Text back to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005