AES Datapath Optimization Strategies for Low-Power Low-Energy Multisecurity-Level Internet-of-Things Applications

被引:53
作者
Bui, Duy-Hieu [1 ]
Puschini, Diego [1 ]
Bacles-Min, Simone [1 ]
Beigne, Edith [1 ]
Tran, Xuan-Tu [2 ]
机构
[1] Grenoble Alpes Univ, CEA LETI, MINATEC Campus, F-38054 Grenoble, France
[2] VNU Univ Engn & Technol, Hanoi 123106, Vietnam
关键词
Advanced encryption standard (AES); Internet-of-Things (IoTs); low energy; low power;
D O I
10.1109/TVLSI.2017.2716386
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Connected devices are getting attention because of the lack of security mechanisms in current Internet-of-Thing (IoT) products. The security can be enhanced by using standardized and proven-secure block ciphers as advanced encryption standard (AES) for data encryption and authentication. However, these security functions take a large amount of processing power and power/energy consumption. In this paper, we present our hardware optimization strategies for AES for high-speed ultralow-power ultralow-energy IoT applications with multiple levels of security. Our design supports multiple security levels through different key sizes, power and energy optimization for both datapath and key expansion. The estimated power results show that our implementation may achieve an energy per bit comparable with the lightweight standardized algorithm PRESENT of less than 1 pJ/b at 10 MHz at 0.6 V with throughput of 28 Mb/s in ST FDSOI 28-nm technology. In terms of security evaluation, our proposed datapath, 32-b key out of 128 b cannot be revealed by correlation power analysis attack using less than 20 000 traces.
引用
收藏
页码:3281 / 3290
页数:10
相关论文
共 23 条
[1]  
[Anonymous], ZIGBEE SPEC
[2]  
[Anonymous], 2001, ADV ENCRYPTION STAND
[3]  
[Anonymous], 2011, IEEE STANDARD LOC 15
[4]  
[Anonymous], 2015, LORAWAN SPEC
[5]  
[Anonymous], 2016, Z WAVE DEVICE CLASS
[6]  
Banik Subhadeep, 2016, Selected Areas in Cryptography - SAC 2015. 22nd International Conference. Revised Selected Papers: LNCS 9566, P178, DOI 10.1007/978-3-319-31301-6_10
[7]   M2M Security: Challenges and Solutions [J].
Barki, Amira ;
Bouabdallah, Abdelmadjid ;
Gharout, Said ;
Traore, Jacques .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1241-1254
[8]  
Bertoni G., 2004, GLSVLSI 04, P277, DOI DOI 10.1145/988952.989019
[9]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[10]  
Canright D, 2005, LECT NOTES COMPUT SC, V3659, P441