Full text

Turn on search term navigation

© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

As the technology of Internet of Things (IoT) evolves, abundant data is generated from sensor nodes and exchanged between them. For this reason, efficient encryption is required to keep data in secret. Since low-end IoT devices have limited computation power, it is difficult to operate expensive ciphers on them. Lightweight block ciphers reduce computation overheads, which are suitable for low-end IoT platforms. In this paper, we implemented the optimized CHAM block cipher in the counter mode of operation, on 8-bit AVR microcontrollers (i.e., representative sensor nodes). There are four new techniques applied. First, the execution time is drastically reduced, by skipping eight rounds through pre-calculation and look-up table access. Second, the encryption with a variable-key scenario is optimized with the on-the-fly table calculation. Third, the encryption in a parallel way makes multiple blocks computed in online for CHAM-64/128 case. Fourth, the state-of-art engineering technique is fully utilized in terms of the instruction level and register level. With these optimization methods, proposed optimized CHAM implementations for counter mode of operation outperformed the state-of-art implementations by 12.8%, 8.9%, and 9.6% for CHAM-64/128, CHAM-128/128, and CHAM-128/256, respectively.

Details

Title
Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things
Author
Kwon, Hyeokdong 1 ; An, SangWoo 2 ; Kim, YoungBeom 2 ; Kim, Hyunji 1 ; Choi, Seung Ju 1 ; Jang, Kyoungbae 1 ; Park, Jaehoon 1 ; Kim, Hyunjun 1 ; Seog Chung Seo 3   VIAFID ORCID Logo  ; Seo, Hwajeong 1   VIAFID ORCID Logo 

 Division of IT Convergence Engineering, Hansung University, Seoul 136-792, Korea; [email protected] (H.K.); [email protected] (H.K.); [email protected] (S.J.C.); [email protected] (K.J.); [email protected] (J.P.); [email protected] (H.K.) 
 Department of Financial Information Security, Kookmin University, Seoul 02707, Korea; [email protected] (S.A.); [email protected] (Y.K.); [email protected] (S.C.S.) 
 Department of Financial Information Security, Kookmin University, Seoul 02707, Korea; [email protected] (S.A.); [email protected] (Y.K.); [email protected] (S.C.S.); Department of Information Security, Cryptology, and Mathematics, Kookmin University, Seoul 02707, Korea 
First page
1548
Publication year
2020
Publication date
2020
Publisher
MDPI AG
e-ISSN
20799292
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2599075129
Copyright
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.