Application-Specific Instruction Set Architecture for an Ultralight Hardware Security Module

被引:0
作者
Ayoub, Ahmed A. [1 ]
Aagaard, Mark D. [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
来源
PROCEEDINGS OF THE 2020 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) | 2020年
关键词
Security; Flexibility; RFID; ASIP; HSM; Lightweight cryptography;
D O I
10.1109/host45689.2020.9300292
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the rapid growth of using Internet of Things (IoT) devices in the daily life, the need to achieve an acceptable level of security and privacy according to the real security risks for these devices is rising. Security risks may include privacy threats like gaining sensitive information from a device, and authentication problems from counterfeit or cloned devices. It becomes more challenging to add strong security features to extremely constrained devices compared to battery operated devices that have more computational and storage capabilities. We propose a novel application specific instruction-set architecture that allows flexibility on many design levels and achieves the required security level for the Electronic Product Code (EPC) passive Radio Frequency Identification (RFID) tag device. Our solution moves a major design effort from hardware to software, which largely reduces the final unit cost. The proposed architecture can be implemented with 4,662 gate equivalent units (GEs) for 65 nm CMOS technology excluding the memory and the cryptographic units. The synthesis results fulfill the requirements of extremely constrained devices and allow the inclusion of cryptographic units into the datapath of the proposed application-specific instruction set processor (ASIP).
引用
收藏
页码:69 / 79
页数:11
相关论文
共 41 条
  • [1] Aagaard MD, 2013, 2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), P29, DOI 10.1109/HST.2013.6581561
  • [2] [Anonymous], 2012, IACR CRYPTOLOGY EPRI
  • [3] [Anonymous], 2009, IISOIEC154082009
  • [4] [Anonymous], 2013, CRYPTOLOGY EPRINT AR
  • [5] Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
  • [6] Buchanan WJ., 2017, J CYBER SECUR TECHNO, V1, P187, DOI [DOI 10.1080/23742917.2017.1384917, 10.1080/23742917.2017.1384917]
  • [7] Ciampolini P, 2008, 2008 15 IEEE INT C E
  • [8] Das R., 2015, IDTECHEX MARKET STUD
  • [9] De Canniere C., ESTREAM ECRYPT STREA
  • [10] A survey of lightweight-cryptography implementations
    Eisenbarth, Thomas
    Kumar, Sandeep
    Paar, Christof
    Poschmann, Axel
    Uhsadel, Leif
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 522 - 533