The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security of Internet of Things (IoT) devices including consumer products has been pointed out. Therefore, authenticated encryptions, which perform both encryption and authentication, have been attracted attention. SIMON-JAMBU is a lightweight authenticated encryption and it passed the second round of CAESAR which determines the standard of authenticated encryptions. Regarding security of hardware,...
Security features of modern (SoC) FPGAs permit to protect the confidentiality of hard- and software IP when the devices are powered off as well as to validate the authenticity of IP when being loaded at startup. However, these approaches are insufficient since attackers with physical access can also perform attacks during runtime, demanding for additional security measures. In particular, RAM used...
The trend in computing is towards the use of FPGAs to improve performance at reduced costs. An indication of this is the adoption of FPGAs for data centre and server application acceleration by notable technological giants like Microsoft, Amazon, and Baidu. The continued protection of Intellectual Properties (IPs) on the FPGA has thus become both more important and challenging. To facilitate IP security,...
Internet of Things (loT) is network connected “Things” such as vehicles, buildings, embedded systems, sensors, as well as people. IoT enables these objects to collect and exchange data of interest to complete various tasks including patient health monitoring, environmental monitoring, system condition prognostics and prediction, smart grid, smart buildings, smart cities, and do on. Due to the large...
The advancements happening in the domain of information technology resulted in growing stature of rapid communication across the world. Telemedicine is one such arena which is benefitted largely because of such revolution. DICOM images are one of the important medical information carriers shared mostly through an unsecured network across the hospitals and health centers. Protection of such significant...
In this paper, we push the limits in maximizing the throughput of side-channel-protected AES-GCM implementations on an FPGA. We present a fully unrolled and pipelined architecture that uses a Boolean masking countermeasure (specifically, threshold implementation) for first-order DPA resistance. Using a high-end Virtex-7 device, we obtain a throughput of 15.24 Gbit/s. Since masked implementations require...
Authentication and encryption within an embedded system environment using cameras, sensors, thermostats, autonomous vehicles, medical implants, RFID, etc. is becoming increasing important with ubiquitious wireless connectivity. Hardware-based authentication and encryption offer several advantages in these types of resource-constrained applications, including smaller footprints and lower energy consumption...
For the rapid response and security requirements of network communication, this paper develops a new implement method of encryption and authentication scheme SM4-GCM on FPGA with low resource occupancy and fast processing speed. This method adopts the SM4 algorithm with independent intellectual property rights. Two SM4 modules are used during encryption to improve the data processing speed by Ping-Pong...
In today's scenario, securing the personal medical records needs a special attention owing to the mammoth increase of electronic patient record processing. Most of the reported works on medical data security have been implemented on software platform. In this paper, DICOM medical image encryption on reconfigurable hardware is proposed. The encryption algorithm employed for DICOM images has used key...
This work implements an FPGA (Field Programmable Gate Array) based reconfigurable IPSec ESP core. The IPSec protocol, developed by the IETF (Internet Engineering Task Force) in 1998, is a popular solution to facilitate protection of the data being transferred at the IP layer. IPSec ESP is one of the two main IPSec protocols (AH: Authentication Header and ESP: Encapsulation Security Payload). IPSec...
Security is very important in present day life. In this computer-networked world, most of the activities are computer based, and the data transactions arc protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords might be related to an individual that can lead to dictionary attacks. Indeed, remembering...
Authenticated ciphers are cryptographic transformations which combine the functionality of confidentiality, integrity, and authentication. This research uses register transfer-level (RTL) design to describe selected authenticated ciphers using a hardware description language (HDL), verifies their proper operation through functional simulation, and implements them on target FPGAs -- the Xilinx Virtex-6...
Message verification is important for information security, and the hash-based algorithm is a kind of implementation method. In this paper, we propose a circuit implementation scheme to realize message verification, which is based on SHA1, called HMAC-SHA1. In our scheme, the MD5 circuit module is reusable such that the circuit size is reduced and the processing speed is improved. Finally, we use...
Security has always been the toughest challenge in data communication, at the same time it is the biggest necessity in transmitting confidential data. Sensitive data are often at stake when they are deployed in a network. Embedded system design is a very popular research activity as it has a wide range of applications namely, security and surveillance, personal digital assistant, biomedical systems,...
This paper proposes a solution to improve the security of the partial dynamic reconfiguration of FPGA, without significantly affecting the reconfiguration performance. The existing solutions for secure partial dynamic reconfiguration on SRAM based FPGAs impact the reconfiguration process and the available resources due to their complex multi-layered partial bitstream validation process. This adversely...
Since their inception, field-programmable gate arrays (FPGAs) have grown in capacity and complexity so that now FPGAs include millions of gates of logic, megabytes of memory, high-speed transceivers, analog interfaces, and whole multicore processors. Applications running in the FPGA include communications infrastructure, digital cinema, sensitive database access, critical industrial control, and high-performance...
Reconfiguration of FPGAs is becoming increasingly popular particularly in networking applications. In order to protect FPGA designs against attacks, secure reconfiguration must be performed. This paper introduces low cost solutions for protecting FPGA designs. This is achieved by implementing low cost hardware architectures of authenticated encryption (AES-CCM, AES-GCM, and PRESENT-GCM) in the static...
This paper describes low cost solution for bitstream security by adding authentication and encryption to the reconfiguration process using Authenticated Encryption (AE). Compact ASIC architecture for AE is presented: Counter with Cipher Block Chaining-Message Authentication Code (CCM). Proposed architecture utilizes Advanced Encryption Standard (AES) in Counter mode (CTR) for encryption. For authentication,...
Intellectual Property protection on FPGAs is a major challenge for FPGA manufacturers. Adding security features to the FPGA is not difficult but there is no consistency among the different manufacturers. Meanwhile, more features will increase resource costs and product prices, forcing users to pay for all these features even if they do not use them. As a result, decoders are often not integrated inside...
This paper presents a hardware architecture for secure quadrotor communication. Both, the control data sent by the ground station and the information data sent by the quadrotor are encrypted and authenticated. The system is implemented on an FPGA and integrated on an extension board. The board is embedded into a self-constructed quadrotor based on the project Next-Generation Universal Aerial Video...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.