Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Compact Implementations of ARX-Based Block Ciphers on IoT Processors

Published: 06 February 2018 Publication History

Abstract

In this article, we present implementations for Addition, Rotation, and eXclusive-or (ARX)-based block ciphers, including LEA and HIGHT, on IoT devices, including 8-bit AVR, 16-bit MSP, 32-bit ARM, and 32-bit ARM-NEON processors. We optimized 32-/8-bitwise ARX operations for LEA and HIGHT block ciphers by considering variations in word size, the number of general purpose registers, and the instruction set of the target IoT devices. Finally, we achieved the most compact implementations of LEA and HIGHT block ciphers. The implementations were fairly evaluated through the Fair Evaluation of Lightweight Cryptographic Systems framework, and implementations won the competitions in the first and the second rounds.

References

[1]
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. 2014. The SIMON and SPECK block ciphers on AVR 8-bit microcontrollers. In International Workshop on Lightweight Cryptography for Security and Privacy. Springer, 3--20.
[2]
Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. 2015. The SIMON and SPECK lightweight block ciphers. In 52nd Annual Design Automation Conference. ACM, 175.
[3]
Alex Biryukov, Johann Großschädl, Yann Le Corre, Andre Stemper, Vesselin Velichkov, Dmitry Khovratovich, Léo Perrin, Daniel Dinu, and Aleksei Udovenko. 2015. FELICS—Fair Evaluation of Lightweight Cryptographic Systems. NIST Workshop on Lightweight Cryptography (2015). https://www.cryptolux.org/index.php/FELICS.
[4]
Benjamin Buhrow, Paul Riemer, Mike Shea, Barry Gilbert, and Erik Daniel. 2014. Block cipher speed and energy efficiency records on the MSP430: System design trade-offs for 16-bit embedded applications. In International Conference on Cryptology and Information Security in Latin America. Springer, 104--123.
[5]
Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, and Thomas Roche. 2013. Higher-order side channel security and mask refreshing. In International Workshop on Fast Software Encryption. Springer, 410--424.
[6]
Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, and Alex Biryukov. 2015. Triathlon of lightweight block ciphers for the internet of things. IACR Cryptology ePrint Archive 2015 (2015), 209.
[7]
Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse, Sebastiaan Indesteege, Stéphanie Kerckhof, François Koeune, Tomislav Nad, Thomas Plos, Francesco Regazzoni, et al. 2012. Compact implementation and performance evaluation of block ciphers in ATtiny devices. In International Conference on Cryptology in Africa. Springer, 172--187.
[8]
Thomas Eisenbarth, Sandeep Kumar, Christof Paar, Axel Poschmann, and Leif Uhsadel. 2007. A survey of lightweight-cryptography implementations. IEEE Des. Test Comput. 24, 6 (2007), 522--533.
[9]
Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, and Jesse Walker. 2010. The Skein hash function family. Submission to NIST (Round 3) 7, 7.5 (2010), 3.
[10]
Deukjo Hong, Jung-Keun Lee, Dong-Chan Kim, Daesung Kwon, Kwon Ho Ryu, and Dong-Geon Lee. 2013. LEA: A 128-bit block cipher for fast encryption on common processors. In International Workshop on Information Security Applications. Springer, 3--27.
[11]
Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, et al. 2006. HIGHT: A new block cipher suitable for low-resource device. In International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 46--59.
[12]
Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. 2014. Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. In International Workshop on Selected Areas in Cryptography. Springer, 306--323.
[13]
Dag Arne Osvik, Joppe W. Bos, Deian Stefan, and David Canright. 2010. Fast software AES encryption. In International Workshop on Fast Software Encryption. Springer, 75--93.
[14]
Taehwan Park, Hwajeong Seo, and Howon Kim. 2016. Parallel implementations of SIMON and SPECK. In 2016 International Conference on Platform Technology and Service (PlatCon’16). IEEE, 1--6.
[15]
Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, and Howon Kim. 2015. Compact implementations of LSH. In International Workshop on Information Security Applications. Springer, 41--53.
[16]
Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, and Howon Kim. 2015. Compact implementations of LEA block cipher for low-end microprocessors. In International Workshop on Information Security Applications. Springer, 28--40.
[17]
Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, and Howon Kim. 2013. Parallel implementations of LEA. In International Conference on Information Security and Cryptology. Springer, 256--274.
[18]
Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, and Howon Kim. 2016. Parallel implementations of LEA, revisited. In International Workshop on Information Security Applications. Springer.
[19]
Junwei Wang, Praveen Kumar Vadnala, Johann Großschädl, and Qiuliang Xu. 2015. Higher-order masking in practice: A vector implementation of masked AES for ARM NEON. In Cryptographers’ Track at the RSA Conference. Springer, 181--198.

Cited By

View all
  • (2024)Design, Implementation and Analysis of HIBRI Cipher on IoT PlatformsJournal of The Institution of Engineers (India): Series B10.1007/s40031-024-01067-2105:6(1-13)Online publication date: 11-May-2024
  • (2021)Secure HIGHT Implementation on ARM ProcessorsMathematics10.3390/math90910449:9(1044)Online publication date: 6-May-2021
  • (2021)High-Speed Implementation of PRESENT on AVR MicrocontrollerMathematics10.3390/math90403749:4(374)Online publication date: 13-Feb-2021
  • Show More Cited By

Index Terms

  1. Compact Implementations of ARX-Based Block Ciphers on IoT Processors

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Embedded Computing Systems
    ACM Transactions on Embedded Computing Systems  Volume 17, Issue 3
    May 2018
    309 pages
    ISSN:1539-9087
    EISSN:1558-3465
    DOI:10.1145/3185335
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Journal Family

    Publication History

    Published: 06 February 2018
    Accepted: 01 December 2017
    Revised: 01 November 2017
    Received: 01 March 2017
    Published in TECS Volume 17, Issue 3

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ARM
    2. AVR
    3. FELICS
    4. HIGHT
    5. Internet of Things
    6. LEA
    7. MSP
    8. block cipher
    9. software implementation

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • Institute for Information 8 Communications Technology Promotion (IITP)
    • Korean government (MSIT)
    • Hansung University

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 13 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Design, Implementation and Analysis of HIBRI Cipher on IoT PlatformsJournal of The Institution of Engineers (India): Series B10.1007/s40031-024-01067-2105:6(1-13)Online publication date: 11-May-2024
    • (2021)Secure HIGHT Implementation on ARM ProcessorsMathematics10.3390/math90910449:9(1044)Online publication date: 6-May-2021
    • (2021)High-Speed Implementation of PRESENT on AVR MicrocontrollerMathematics10.3390/math90403749:4(374)Online publication date: 13-Feb-2021
    • (2021)Compact Implementation of ARIA on 16-Bit MSP430 and 32-Bit ARM Cortex-M3 MicrocontrollersElectronics10.3390/electronics1008090810:8(908)Online publication date: 11-Apr-2021
    • (2021)Efficient Implementation of AES and CTR_DRBG on 8-Bit AVR-Based Sensor NodesIEEE Access10.1109/ACCESS.2021.30596239(30496-30510)Online publication date: 2021
    • (2021)Flexible and high‐throughput structures of Camellia block cipher for security of the Internet of ThingsIET Computers & Digital Techniques10.1049/cdt2.12025Online publication date: 12-Mar-2021
    • (2020)ACE: ARIA-CTR Encryption for Low-End Embedded ProcessorsSensors10.3390/s2013378820:13(3788)Online publication date: 6-Jul-2020
    • (2020)Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR MicrocontrollersMathematics10.3390/math81018378:10(1837)Online publication date: 19-Oct-2020
    • (2020)Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of ThingsElectronics10.3390/electronics90915489:9(1548)Online publication date: 22-Sep-2020
    • (2020)PAGE—Practical AES-GCM Encryption for Low-End MicrocontrollersApplied Sciences10.3390/app1009313110:9(3131)Online publication date: 30-Apr-2020
    • Show More Cited By

    View Options

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media