Design and Implementation of Low-power Nano-scale Hardware Based Crypto-systems

Design and Implementation of Low-power Nano-scale Hardware Based Crypto-systems PDF Author: Valliyappan Valliyappan
Publisher:
ISBN: 9781321475159
Category :
Languages : en
Pages : 84

Get Book Here

Book Description
As the technology advances day by day, there is an essential need for a secured data transmission for exchanging information from one user to the other. Generally , data transmission techniques are achieved via private/public data networks. The transmission of data through these networks is not secured. Therefore, some kind of safety is needed for information exchange which is accomplished by encrypting the transmitted data. In this research a novel method is used in which hardware implementations of private/secret key encryption standards such as Advanced Encryption Standard (AES), Triple Data Encryption Standard (TDES) and Data Encryption Standard (DES) are integrated in a single silicon die of group centric Secured Information Sharing. This improves confidentiality, integrity and accuracy of the transmitted data. Advanced Encryption Standard is specified by National Institute of Standards (NIST) in 2001 as the specifications for encryption in electronic communication. It is also known as symmetric key algorithm as the encryption and decryption both are formulated using this single standard key. From the family of ciphers NIST selected three members of Rijndael family, each with key length of 128, 192 and 256 bits for each 128 bit block size as AES. For every key length a fixed number of rounds in AES are processed. For 128, 192 and 256 bits, 10, 12 and 14 rounds are executed respectively. In this research, AES 128 bits has been designed and implemented. Triple Data Encryption Standard (TDES) is a cipher algorithm where original Data Encryption Algorithm (DEA) or DES is applied three times. When DES was originally developed, it was sufficient to withstand the attacks using computer power of that era. However, with the remarkable increase in computing power, this algorithm was not complex enough to withstand the brutal attacks. To overcome this problem, Triple DES was proposed to offer high level of security without proposing any novel cipher algorithm. In this research all these three algorithms are implemented in Verilog and TSMC 65nm technology node. Xilinx ISE and Icarus Verilog are used for simulation of AES and DES. Cadence RTL Compiler is used to synthesize the design with minimum area. Finally the Graphic Database System (GDS) II layout of all the crypto cores and Top Module have been generated using Cadence Encounter.

Design and Implementation of Low-power Nano-scale Hardware Based Crypto-systems

Design and Implementation of Low-power Nano-scale Hardware Based Crypto-systems PDF Author: Valliyappan Valliyappan
Publisher:
ISBN: 9781321475159
Category :
Languages : en
Pages : 84

Get Book Here

Book Description
As the technology advances day by day, there is an essential need for a secured data transmission for exchanging information from one user to the other. Generally , data transmission techniques are achieved via private/public data networks. The transmission of data through these networks is not secured. Therefore, some kind of safety is needed for information exchange which is accomplished by encrypting the transmitted data. In this research a novel method is used in which hardware implementations of private/secret key encryption standards such as Advanced Encryption Standard (AES), Triple Data Encryption Standard (TDES) and Data Encryption Standard (DES) are integrated in a single silicon die of group centric Secured Information Sharing. This improves confidentiality, integrity and accuracy of the transmitted data. Advanced Encryption Standard is specified by National Institute of Standards (NIST) in 2001 as the specifications for encryption in electronic communication. It is also known as symmetric key algorithm as the encryption and decryption both are formulated using this single standard key. From the family of ciphers NIST selected three members of Rijndael family, each with key length of 128, 192 and 256 bits for each 128 bit block size as AES. For every key length a fixed number of rounds in AES are processed. For 128, 192 and 256 bits, 10, 12 and 14 rounds are executed respectively. In this research, AES 128 bits has been designed and implemented. Triple Data Encryption Standard (TDES) is a cipher algorithm where original Data Encryption Algorithm (DEA) or DES is applied three times. When DES was originally developed, it was sufficient to withstand the attacks using computer power of that era. However, with the remarkable increase in computing power, this algorithm was not complex enough to withstand the brutal attacks. To overcome this problem, Triple DES was proposed to offer high level of security without proposing any novel cipher algorithm. In this research all these three algorithms are implemented in Verilog and TSMC 65nm technology node. Xilinx ISE and Icarus Verilog are used for simulation of AES and DES. Cadence RTL Compiler is used to synthesize the design with minimum area. Finally the Graphic Database System (GDS) II layout of all the crypto cores and Top Module have been generated using Cadence Encounter.

Embedded Based Cryptographic Module for Low Power Wireless Sensor Nodes Complying with FIPS 140-2

Embedded Based Cryptographic Module for Low Power Wireless Sensor Nodes Complying with FIPS 140-2 PDF Author: Jesal H. Kanani
Publisher:
ISBN:
Category :
Languages : en
Pages : 85

Get Book Here

Book Description
Cryptography is one of the leading techniques today for ensuring safety in a communications system. Apart from the military use, the information revolution caused by the recent development of computer science has yielded higher and higher demand for the commercial use of cryptography. As a result many ciphering algorithms have been developed in the past and are being continuously researched. Modern ciphering modules include techniques of implementing these crypto algorithms into them in the form of either hardware or software or both, the end result being a safe and secure communication channel. Looking at the growing research done in this field along with new ways of breaking ciphers, the National Institute for Standard and Technology (NIST) published a standard called the Federal Information Processing Standard (FIPS) in January 1994. The FIPS calls for a uniform pattern that is to be used by federal organizations during the implementation of cryptographic-based security systems that deals with sensitive and valuable data. The standard provides security requirements covering areas related to secure design and implementation of a cryptographic module. It provides four increasing, quantitative levels of security intended to cover a wide range of potential applications and environments. The thesis presents a framework for a Cryptographic Module for wireless sensor nodes complying with FIPS 140-2. The module will be installed on Navy ships along with existing wireless sensor nodes and hence comes the FIPS validation requirement. The module is being implemented on a Texas Instrument MSP430 micro-processor and the IAR embedded workbench programming and compiling. Since the crypto module needs to comply with the FIPS, the ciphering algorithm used is the Advanced Encryption Standard (AES) as it is a FIPS approved algorithm. Given the requirements, the module will be primarily responsible for the I/O of binary data to and from the master controller and ciphering and deciphering of this data using the AES ciphering algorithm along with various authentication and error checking techniques. The presented architecture and hence the crypto module can be used for several other applications except the mentioned use with sensor nodes and can be made commercially available by the company supporting its development.

Design a Cmos-based Encryption Architecture for Implantable-wearable Devices Through Chaotic Equations

Design a Cmos-based Encryption Architecture for Implantable-wearable Devices Through Chaotic Equations PDF Author: Ravi N. Monani (Graduate student)
Publisher:
ISBN:
Category : Chaotic behavior in systems
Languages : en
Pages : 0

Get Book Here

Book Description
Abstract: Chaos is an interesting phenomenon for nonlinear systems that emerges due to its complex and unpredictable behavior. With the escalated use of low-powered edged-compute devices, data security at edge develops the need for security in communication. The fact that Chaos synchronizes over time for two different chaotic systems with their own unique initial conditions, is the base for chaos implementation in communication. This thesis talks about an encryption architecture suitable for on-chip integration with sensors. This concept provides a POC (proof of concept) that security is encrypted on the same chip with sensors itself. This algorithm is based on Chua’s chaotic system and implemented as Time Scaling Chaotic Shift Keying (TS-CSK). This POC research focuses on different chaotic equations that can be analyzed for encryption. In communication, encryption is being used with the help of microcontrollers or software implementations, which turn up using more power and complex hardware implementation. The small Internet of Things (IoT) devices are expected to be operated on low power and constrained with size. At the same time, these devices are highly vulnerable to security threats, which elevates the need to have low power/size hardware-based security. Since the discovery of chaotic equations, there have been various encryption applications with them. The goal of this research is to take the chaotic implementation to the CMOS level with the sensors on the same chip. This paper focuses on four different chaotic equations and achieves the simulations to find alternative architecture that can further reduce the power and the area. The spice simulation is demonstrated for the complete encryption/decryption architecture with Chua’s chaotic equation. The FPGA implementation is carried out to measure the hardware utilization of previously implemented Lorenz and Chua. The LUT (Look-Up Table) utilization is considered as merit to identify the resource utilization on the FPGA board with the help of the Xilinx System Generation toolbox. To advance the research with the goal of fabricating the circuit with CMOS, the cadence implementation of Chua has been achieved.

Information Hiding

Information Hiding PDF Author: Stefan Katzenbeisser
Publisher: Springer Science & Business Media
ISBN: 3642044301
Category : Computers
Languages : en
Pages : 286

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Workshop on Information Hiding, IH 2009, held in Darmstadt, Germany, in June 2009. The 19 revised full papers presented were carefully reviewed and selected from 55 submissions. The papers are organized in topical sections on steganography, steganalysis, watermarking, fingerprinting, hiding in unusual content, novel applications and forensics.

Constructive Side-Channel Analysis and Secure Design

Constructive Side-Channel Analysis and Secure Design PDF Author: Josep Balasch
Publisher: Springer Nature
ISBN: 3030997669
Category : Computers
Languages : en
Pages : 279

Get Book Here

Book Description
This book constitutes revised selected papers from the 13th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2022, held in Leuven, Belgium, in April 2022. The 12 full papers presented in this volume were carefully reviewed and selected from 25 submissions. The papers cover the following subjects: implementation attacks, secure implementation, implementation attack-resilient architectures and schemes, secure design and evaluation, practical attacks, test platforms, and open benchmarks.

Hardware Protection through Obfuscation

Hardware Protection through Obfuscation PDF Author: Domenic Forte
Publisher: Springer
ISBN: 3319490192
Category : Technology & Engineering
Languages : en
Pages : 352

Get Book Here

Book Description
This book introduces readers to various threats faced during design and fabrication by today’s integrated circuits (ICs) and systems. The authors discuss key issues, including illegal manufacturing of ICs or “IC Overproduction,” insertion of malicious circuits, referred as “Hardware Trojans”, which cause in-field chip/system malfunction, and reverse engineering and piracy of hardware intellectual property (IP). The authors provide a timely discussion of these threats, along with techniques for IC protection based on hardware obfuscation, which makes reverse-engineering an IC design infeasible for adversaries and untrusted parties with any reasonable amount of resources. This exhaustive study includes a review of the hardware obfuscation methods developed at each level of abstraction (RTL, gate, and layout) for conventional IC manufacturing, new forms of obfuscation for emerging integration strategies (split manufacturing, 2.5D ICs, and 3D ICs), and on-chip infrastructure needed for secure exchange of obfuscation keys- arguably the most critical element of hardware obfuscation.

Introduction to Hardware Security and Trust

Introduction to Hardware Security and Trust PDF Author: Mohammad Tehranipoor
Publisher: Springer Science & Business Media
ISBN: 1441980806
Category : Technology & Engineering
Languages : en
Pages : 429

Get Book Here

Book Description
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society’s microelectronic-supported infrastructures.

Advances in Image and Data Processing Using VLSI Design

Advances in Image and Data Processing Using VLSI Design PDF Author: Sandeep Saini
Publisher:
ISBN: 9780750339193
Category : Image processing
Languages : en
Pages : 0

Get Book Here

Book Description
VLSI is a well-established field of research that ignited the modern computing revolution. Serving as a guide to future developments, this book provides a framework for design, modeling concepts, and application of Image Processing based systems using VLSI design techniques.

Nanoelectronic Devices for Hardware and Software Security

Nanoelectronic Devices for Hardware and Software Security PDF Author: Arun Kumar Singh
Publisher: CRC Press
ISBN: 1000464989
Category : Technology & Engineering
Languages : en
Pages : 353

Get Book Here

Book Description
Nanoelectronic Devices for Hardware and Software Security has comprehensive coverage of the principles, basic concepts, structure, modeling, practices, and circuit applications of nanoelectronics in hardware/software security. It also covers the future research directions in this domain. In this evolving era, nanotechnology is converting semiconductor devices dimensions from micron technology to nanotechnology. Nanoelectronics would be the key enabler for innovation in nanoscale devices, circuits, and systems. The motive for this research book is to provide relevant theoretical frameworks that include device physics, modeling, circuit design, and the latest developments in experimental fabrication in the field of nanotechnology for hardware/software security. There are numerous challenges in the development of models for nanoscale devices (e.g., FinFET, gate-all-around devices, TFET, etc.), short channel effects, fringing effects, high leakage current, and power dissipation, among others. This book will help to identify areas where there are challenges and apply nanodevice and circuit techniques to address hardware/software security issues.

Low Power Methodology Manual

Low Power Methodology Manual PDF Author: David Flynn
Publisher: Springer Science & Business Media
ISBN: 0387718192
Category : Technology & Engineering
Languages : en
Pages : 303

Get Book Here

Book Description
This book provides a practical guide for engineers doing low power System-on-Chip (SoC) designs. It covers various aspects of low power design from architectural issues and design techniques to circuit design of power gating switches. In addition to providing a theoretical basis for these techniques, the book addresses the practical issues of implementing them in today's designs with today's tools.