Authenticated Encryption for Low-Power Reconfigurable Wireless Devices

Authors

  • Samant Khajuria Aalborg University, Denmark, and Copenhagen University College of Engineering, Lautrupvang 15, 2750 Ballerup, Denmark
  • Birger Andersen Aalborg University, Denmark, and Copenhagen University College of Engineering, Lautrupvang 15, 2750 Ballerup, Denmark

DOI:

https://doi.org/10.13052/jcsm2245-1439.1233

Keywords:

authenticated encryption, confidentiality, message authentication, FPGA, wireless devices

Abstract

With the rapid growth of new wireless communication standards, a solution that is capable of providing a seamless shift between existing wireless protocols and high flexibility as well as capability is crucial. Technology based on reconfigurable devices offers this flexibility. In order to avail this enabling technology, these radios have to propose cryptographic services such as confidentiality, integrity and authentication. Therefore, integration of security services to these low-power devices is very challenging and crucial as they have limited resources and computational capabilities. In this paper, we present a crypto solution for reconfigurable devices. The solution is a single pass Authenticated Encryption (AE) scheme that is designed for protecting both message confidentiality and its authenticity. This makes AE very attractive for low-cost low-power hardware implementation. For test and performance evaluation the design has been implemented in Xilinx Spartan-3 sxc3s700an FPGA. Additionally, this paper analyzes different hardware architectures and explores area/delay tradeoffs in the implementation.

Downloads

Download data is not yet available.

Author Biographies

Samant Khajuria, Aalborg University, Denmark, and Copenhagen University College of Engineering, Lautrupvang 15, 2750 Ballerup, Denmark

Samant Khajuria is a PhD student at the Center forTele Infra Structure (CTIF) Copenhagen at Aalborg University (Denmark). He received his Bachelor in Electronics and Communication in 2006 from PES Institute of Technology – Bangalore (INDIA) and Masters Degree in Communication networks (spe-cializing in security) in 2008 from Aalborg University Copenhagen. He started as a research assistant at the Center for Wireless Systems and Applica-tions (CWSA), before starting his PhD. Major research areas include Cryptography, Cognitive Radio,Computer Networks, FPGAs

Birger Andersen, Aalborg University, Denmark, and Copenhagen University College of Engineering, Lautrupvang 15, 2750 Ballerup, Denmark

Birger Andersen is a Professor at Copenhagen University College of Engineering, Denmark, and Director of Center for Wireless Systems and Ap-plications (CWSA) related. He received his M.Sc.in Computer Science in 1988 and his Ph.D. inComputer Science in 1992, both from University of Copenhagen. He was an assistant professor at University of Copenhagen, a visiting professor at Universit ̈at Kaiserslautern, Germany, and an associate professor at Aalborg University. Later he joined the IT Department of Copenhagen Business School,Denmark, and finally Copenhagen University College of Engineering. He is currently involved in research in wireless systems with a focus on security

References

D. Ma and G. Tsudik. Security and privacy in emerging networks. IEEE Wireless Communications, 17(5), 12–21, October 2010.

C. Jutla. Encryption modes with almost free message integrity. In Advances in Crypto-logy EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, pp. 529–544.Springer Verlag, Berlin, 2001.

V.D. Gligor and P. Donescu. Fast encryption and authentication: XCBC encryption and XECB authentication modes. In Proceedings of Fast Software Encryption 2001, M.Matsui (Ed.), Lecture Notes in Computer Science, Vol. 2355. Springer Verlag, Berline,2001.

P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: A block-cipher mode of operation for efficient authenticated encryption. In Proceedings of 8th CCS. ACM, New York, 2001.

M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology – ASIACRYPT2000, Vol. 1976, pp. 531–545. Springer Verlag, Berlin, 2000.

G. Jakimoski and S. Khajuria. ASC-1: An authenticated encryption stream cipher. In Selected Areas in Cryptography 2011, Lecture Notes in Computer Science, Vol. 7118,pp. 356–372. Springer Verlag, Berlin, 2011.

Downloads

Published

2012-04-25

How to Cite

1.
Khajuria S, Andersen B. Authenticated Encryption for Low-Power Reconfigurable Wireless Devices. JCSANDM [Internet]. 2012 Apr. 25 [cited 2024 Jul. 22];1(2-3):188-203. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6105

Issue

Section

Articles