Total views : 306
FPGA Implementation and Analysis of the Block Cipher Mode Architectures for the PRESENT Light Weight Encryption Algorithm
Objective: This paper presents the Field Programmable Gate Array (FPGA) implementations of the different block cipher mode architectures of the ISO standardized light weight block cipher PRESENT, designed for resource constrained devices. Methods/ Statistical Analysis: The performance evaluations compare the implementations of the different block cipher modes, namely Electronic Code Book (ECB) mode, Cipher Block Chaining (CBC) mode, Cipher Feedback Mode (CFB), Output Feed Back Mode (OFB) and CounTeR (CTR) mode for the PRESENT cipher. The throughput of encryption of three successive 64 bit blocks of data ranges from 565.312Mbps to 574.784Mbps for the modes other than the cipher feedback mode in the Spartan-3 FPGA. The throughput for providing confidentiality through encryption in the cipher feedback mode arrives as 68.912 Mbps, 155.392Mbps and 300.8 Mbps for a 64 bit block of data for the input streams of size 8 bits, 16 bits and 32 bits respectively. Findings: The throughput of the block cipher mode hardware architectures of the light weight cipher PRESENT demonstrates the high speed performance of the cipher in encryption/decryption of data as blocks and streams. Application/ Improvement: The significance of the proposed work is to know the hardware performance of the different modes of operation for the light weight block cipher PRESENT. The performance estimation of the block cipher modes operations of the PRESENT cipher definition in hardware have been carried out for the first time.
Block Cipher Modes, FPGA, Internet of Things (IoT), Light Weight Cipher.
- Bogdanov A. PRESENT: an ultra-lightweight block cipher, In: Proceedings of the 9th inter- national workshop on cryptographic hardware and embedded systems. Vienna, Austria: Springer-Verlag. 2007:4727:450-66.
- Dworkin M. Recommendation for Block Cipher Modes of Operation NIST Special Publication 800-38A 2001 Edition. 2010, p. 1-13.
- Block cipher mode of operation.https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation, Date accessed: 30/ 08/2016.
- Huang CW. Block RAM Based Design of 8-bit AES Operation Modes. Procedia Engineering. 2012; 29:2848-52.
- Chit CU, Glesner M. An FPGA implementation of the AES-Rijndael in OCB/ECB modes of operation. Microelectronics Journal. 2005; 36(2):139-46.
- Tarhuni MA. Enhanced Counter ModeThe 9th Asia-Pacific Conference on Communications, APCC Malaysia, 2003, 2, p. 701-05.
- Grabowski JS, Youssef A. An FPGA Implementation of AES with Support for Counter and Feedback Modes. International Conference on Microelectronics, Cairo 2007, p. 39 - 42.
- Huang CW. The Five Modes AES Applications in Sounds and Images. Sixth International Conference on Information Assurance and Security (IAS), August Atlanta, GA, 2010, p.28 -31.
- Alomari MA. A study on encryption algorithms and modes for disk encryption. International Conference on Signal Processing Systems, Singapore, 2009, p. 793-97.
- Jayasinghe D. Advanced Modes in AES: Are they Safe from Power Analysis based Side Channel Attacks. 32nd IEEE International Conference on Computer Design (ICCD), Seoul, 2014, p. 173-180.
- Jaffe J. A first-order DPA attack against AES in counter mode with unknown initial counter, Cryptographic Hardware and Embedded Systems - CHES of Lecture Notes in Computer Science, Springer Berlin Heidelberg. 2007; 4727:1–13.
- Rogawayet P. OCB: A Block-Cipher Mode of Operation for Efficient Authenticated Encryption. Eighth ACM Conference on Computer and Communications Security ACM CCS, ACM Press, Colorado, 2001. p. 196–205.
- Kohno T. CWC: A high-performance conventional authenticated encryption mode, Proceedings of FSELNCS Springer- Verlag, 2004; 3017:408-26.
- David A, McGrew M, Viega J. The Security and Performance of the Galois/Counter Mode (GCM) of Operation, Progress in Cryptology-INDOCRYPT, Springer-Verlag, 2004; 3348:345-55.
- Lopez-Trejo E. Efficient FPGA implementation of CCM mode using AES. International Conference on Information Security and Cryptology Lecture Notes in Computer Science, Seoul, Korea, Springer-Verlag, 2005; 3935:208–215.
- Chakraborty D, Sarkar P. A General Construction of Tweakable Block Ciphers and Different Modes of Operations. Information Security and Cryptology, Springer, 2006, p. 88–102.
- Sung J. Concrete security analysis of ctr-ofb and ctr-cfb modes of operation. Proceedings of Information Security and Cryptology - ICISC 2001Lecture Notes in Computer Science, Springer- Verlag, 2002, p. 103-13.
- Menezes A, Oorschot PV, Vanstone S. Handbook of Applied Cryptography, by CRC Press, 1996.
- Krovetz T, Rogaway P. The OCB Authenticated-Encryption Algorithm. Internet Draft draft-krovetz-ocb-00, CFRG Working Group, 2005.
- Sasi SW, Sivanandam N. A Survey on Cryptography using Optimization algorithms in WSNs. Indian Journal of Science and Technology. 2015 Feb; 8(3):216-21.
- Isha, Luhach AK. Analysis of Lightweight Cryptographic Solutions for Internet of Things. Indian Journal of Science and Technology. 2016 Jul; 9(28):1-7.
- Alomari MA, Samsudin K, Ramli AR. Implementation of a Parallel XTS Encryption Mode of Operation. Indian Journal of Science and Technology. 2014 Nov; 7(11):1813-19.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.