Abstract

This article describes the implementation of the AES-GCM for IoT-oriented low-end 8/16/32-bit general-purpose processors. Although various aspects of implementations of the AES-GCM for high-end processors and hardware were examined in detail, the low-end processors to a lesser extent. This article estimates the speed and memory demand for various approaches to ensuring resistance to attacks, such as timing analysis and simple power analysis by ensuring the constant algorithm execution time. A particular attention is paid to the low-level multiplication implementation in GF (2128) for each architecture as a key galois/counter mode operation, because low-end processors do not have ready-made instructions for carry-less multiplication. For each AVR/MSP430/ARM Cortex-M3 processor core, a constant time implementation of carry-less multiplication is proposed, the performance of which approaches the Not Constant Time algorithm.

Highlights

  • A CCORDING to the IoT concept, the IoT devices need to be able to communicate by sending and receiving information, but they are expected to use a secure communication method or protocol in a public network [1], [2]

  • IoT devices can be perceived as interconnected Embedded Systems, and their design usually includes microcontrollers (MCUs)

  • OF THIS ARTICLE This article aims to explore ways of effective software implementation of the AES-Galois/counter mode (GCM) authenticated encryption with associated data (AEAD) algorithm, often used in IoT applications and to estimate and compare the demand for resources for typical low-end 8/16/32-bit processors, because this issue is not highlighted enough in publications known to authors

Read more

Summary

Introduction

A CCORDING to the IoT concept, the IoT devices need to be able to communicate by sending and receiving information, but they are expected to use a secure communication method or protocol in a public network [1], [2]. Various aspects of this interaction must be reliably protected. This is especially important in the case of critical infrastructure, which determines the life and health of people. IoT devices can be perceived as interconnected Embedded Systems, and their design usually includes microcontrollers (MCUs). MCUs usually offer very limited computing power, and they have relatively little ROM and RAM memory. The cryptographic algorithms implemented on embedded systems must be efficient (use minimum resources) and be resistant to a wide range of attacks including

Objectives
Methods
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.