Energy Characterization of a Security Module in ARM Processor
نویسندگان
چکیده
This article shows the results obtained during simulations that measured runtime and energy consumption of a security module (SEMO) when it executes in ARM processor. For the simulations, we considered the impacts of four algorithms (i.e. RSA, SHA-1, Random Numbers Generator and AES). We have used the Sim-Panalyzer simulator and obtained an average energy consumption (x2 Joules) and runtime (x26000 cycles). We also show the impact of some compiler optimizations in the energy consumption of the AES algorithm.
منابع مشابه
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
ARM TrustZone, which provides a Trusted Execution Environment (TEE), normally plays a role in keeping security-sensitive resources safe. However, to properly control access to the resources, it is not enough to just isolate them from the Rich Execution Environment (REE). In addition to the isolation, secure communication should be guaranteed between security-critical resources in the TEE and le...
متن کاملUltra-Low-Energy DSP Processor Design for Many-Core Parallel Applications
Background and Objectives: Digital signal processors are widely used in energy constrained applications in which battery lifetime is a critical concern. Accordingly, designing ultra-low-energy processors is a major concern. In this work and in the first step, we propose a sub-threshold DSP processor. Methods: As our baseline architecture, we use a modified version of an existing ultra-low-power...
متن کاملA characterization of finitely generated multiplication modules
Let $R$ be a commutative ring with identity and $M$ be a finitely generated unital $R$-module. In this paper, first we give necessary and sufficient conditions that a finitely generated module to be a multiplication module. Moreover, we investigate some conditions which imply that the module $M$ is the direct sum of some cyclic modules and free modules. Then some properties of Fitting ideals o...
متن کاملFast Implementation of AES on Mobile Devices
The Advanced Encryption Standard (AES) became the standard for encryption to protect the sensitive information. With the increasing use of portable and wireless devices and demanding information security needs in embedded systems, prompted efforts to find fast software based implementation of AES encryption/decryption capable of running on resource constrained environment in terms of processor ...
متن کامل$G$-dual Frames in Hilbert $C^{*}$-module Spaces
In this paper, we introduce the concept of $g$-dual frames for Hilbert $C^{*}$-modules, and then the properties and stability results of $g$-dual frames are given. A characterization of $g$-dual frames, approximately dual frames and dual frames of a given frame is established. We also give some examples to show that the characterization of $g$-dual frames for Riesz bases in Hilbert spaces is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- I. J. Network Security
دوره 17 شماره
صفحات -
تاریخ انتشار 2015