Authenticated Encryption for Low-Power Reconfigurable Wireless Devices
DOI:
https://doi.org/10.13052/jcsm2245-1439.1233Keywords:
authenticated encryption, confidentiality, message authentication, FPGA, wireless devicesAbstract
With the rapid growth of new wireless communication standards, a solution that is capable of providing a seamless shift between existing wireless protocols and high flexibility as well as capability is crucial. Technology based on reconfigurable devices offers this flexibility. In order to avail this enabling technology, these radios have to propose cryptographic services such as confidentiality, integrity and authentication. Therefore, integration of security services to these low-power devices is very challenging and crucial as they have limited resources and computational capabilities. In this paper, we present a crypto solution for reconfigurable devices. The solution is a single pass Authenticated Encryption (AE) scheme that is designed for protecting both message confidentiality and its authenticity. This makes AE very attractive for low-cost low-power hardware implementation. For test and performance evaluation the design has been implemented in Xilinx Spartan-3 sxc3s700an FPGA. Additionally, this paper analyzes different hardware architectures and explores area/delay tradeoffs in the implementation.
Downloads
References
D. Ma and G. Tsudik. Security and privacy in emerging networks. IEEE Wireless Communications, 17(5), 12–21, October 2010.
C. Jutla. Encryption modes with almost free message integrity. In Advances in Crypto-logy EUROCRYPT 2001, Lecture Notes in Computer Science, Vol. 2045, pp. 529–544.Springer Verlag, Berlin, 2001.
V.D. Gligor and P. Donescu. Fast encryption and authentication: XCBC encryption and XECB authentication modes. In Proceedings of Fast Software Encryption 2001, M.Matsui (Ed.), Lecture Notes in Computer Science, Vol. 2355. Springer Verlag, Berline,2001.
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB: A block-cipher mode of operation for efficient authenticated encryption. In Proceedings of 8th CCS. ACM, New York, 2001.
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. In Advances in Cryptology – ASIACRYPT2000, Vol. 1976, pp. 531–545. Springer Verlag, Berlin, 2000.
G. Jakimoski and S. Khajuria. ASC-1: An authenticated encryption stream cipher. In Selected Areas in Cryptography 2011, Lecture Notes in Computer Science, Vol. 7118,pp. 356–372. Springer Verlag, Berlin, 2011.