Design and Implementation of Efficient and Secure Lightweight Cryptosystems

نویسنده

  • Shohreh Sharif Mansouri
چکیده

In recent years there has been a wide-spread deployment of batterypowered and passive devices such as RFID tags, systems with very strong limitations on area, cost and power budgets. Deploying cryptographic solutions for these systems is both important, because it could unlock several security-critical applications, and challenging, due to the stringent budgets: the overheads of even the smallest block ciphers are often one or more orders of magnitude too high. Because of this reason there is a growing interest in lightweight cryptography, a discipline that tries to develop cryptographic solutions for systems with very tight cost, area and power constraints. The importance of lightweight cryptography is forecasted to continue growing in the future, with lightweight systems becoming more ubiquitous and more common in sensitive applications. In this work we analyse and solve several problems related to lightweight cryptography. We first study efficient implementations of feedback shift registers (FSR)based cryptosystems, such as stream ciphers and hash functions, that are specifically designed for highly-constrained environments. The core of our solution is to apply a Fibonacci-to-Galois transformation that changes the structure of an FSR to minimise its critical path. Along with this transformation we apply several hardware optimization techniques, such as pipelining and double-frequency clock generators, that are necessary to obtain throughput benefits. Our results show impressive throughput improvements (100% for some cryptographic systems) without any area and power penalties. In a second part, we show how to protect FSR-based stream ciphers from power analysis attacks, a type of attack that exploits the information content in the power trace of a system. It is well known that, due to their very simple hardware structure, FSR-based stream ciphers are very vulnerable to this type of attacks. We introduce two different countermeasures against power analysis attacks: one at the architectural level (masking the switching activity of the FSRs) and the other one at the physical level (flattening the power curve to one among two power levels). Both solutions exploit the properties of FSR-based stream ciphers with the specific goal to minimise their area and power overheads. We demonstrate them on the FSR-based stream cipher Grain by performing Differential Power Analysis (DPA) and Mutual Information Analysis (MIA) attacks at SPICE level. However, the techniques we introduce are general and can potentially be applied to any FSR-based stream ciphers. In a third part, we focus on Ring Oscillator Physical Unclonable Functions (RO-PUFs), a type of digital fingerprint used for chip identification that is well-suited for lightweight cryptography. We suggest solutions to two well-known problems related to this type of PUF: how to generate a secure and large challenge-response database and how to increase PUF reliability in presence of temperature variations. We validate our solutions at SPICE level by modelling the random variations introduced during manufacturing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014