Design and Implementation of Authenticated Encryption Co-Processors for Satellite Hardware Security

Mohamed H. Abdulmonem, Ahmed K. Ismail, H. Mostafa
{"title":"Design and Implementation of Authenticated Encryption Co-Processors for Satellite Hardware Security","authors":"Mohamed H. Abdulmonem, Ahmed K. Ismail, H. Mostafa","doi":"10.1109/ICM52667.2021.9664957","DOIUrl":null,"url":null,"abstract":"FPGA implementation is attained through either the traditional Register Transfer Level (RTL) flow or High-Level Synthesis (HLS) flow. The Consultative Committee for Space Data Systems (CCSDS) has recommended a standard for security algorithms for space missions. Authenticated encryption, the most important of those algorithms, can be achieved by either cipher-based or hash-based algorithms. In this paper, firstly, a brief explanation of the CCSDS standard authenticated encryption algorithms of both types is provided. Secondly, the algorithms are implemented in both RTL and HLS flows to measure and quantify the gap between the two design flows. Results show that the HLS modules utilize 44% more LUTs and consume an average of 40.8% more power than the RTL ones. In addition, the RTL modules demonstrated 28 times higher throughput than that of the HLS ones. Therefore, it is recommended to use the traditional RTL approach over the HLS one and the cipher-based module over the hash-based one at the expense of longer time-to-market for the RTL design. Additionally, the cipher-based module when compared to the hash-based one has proven higher efficiency utilizing 12% less area, achieving 35% higher throughput, and consuming 17% less energy per bit.","PeriodicalId":212613,"journal":{"name":"2021 International Conference on Microelectronics (ICM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Microelectronics (ICM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICM52667.2021.9664957","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

FPGA implementation is attained through either the traditional Register Transfer Level (RTL) flow or High-Level Synthesis (HLS) flow. The Consultative Committee for Space Data Systems (CCSDS) has recommended a standard for security algorithms for space missions. Authenticated encryption, the most important of those algorithms, can be achieved by either cipher-based or hash-based algorithms. In this paper, firstly, a brief explanation of the CCSDS standard authenticated encryption algorithms of both types is provided. Secondly, the algorithms are implemented in both RTL and HLS flows to measure and quantify the gap between the two design flows. Results show that the HLS modules utilize 44% more LUTs and consume an average of 40.8% more power than the RTL ones. In addition, the RTL modules demonstrated 28 times higher throughput than that of the HLS ones. Therefore, it is recommended to use the traditional RTL approach over the HLS one and the cipher-based module over the hash-based one at the expense of longer time-to-market for the RTL design. Additionally, the cipher-based module when compared to the hash-based one has proven higher efficiency utilizing 12% less area, achieving 35% higher throughput, and consuming 17% less energy per bit.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
卫星硬件安全认证加密协处理器的设计与实现
FPGA实现可以通过传统的寄存器传输级(RTL)流程或高级合成(HLS)流程来实现。空间数据系统协商委员会(空间数据系统咨委会)建议了一项空间任务安全算法标准。这些算法中最重要的身份验证加密可以通过基于密码或基于哈希的算法来实现。本文首先对两种类型的CCSDS标准认证加密算法进行了简要说明。其次,在RTL和HLS两个设计流程中实现了算法,以测量和量化两个设计流程之间的差距。结果表明,HLS模块比RTL模块多使用44%的lut,平均多消耗40.8%的功率。此外,RTL模块的吞吐量比HLS模块高28倍。因此,建议使用传统的RTL方法而不是HLS方法,使用基于密码的模块而不是基于哈希的模块,代价是RTL设计的上市时间更长。此外,与基于哈希的模块相比,基于密码的模块具有更高的效率,使用的面积减少了12%,吞吐量提高了35%,每比特消耗的能量减少了17%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Hardware Implementation of Yolov4-tiny for Object Detection Comparative Study of Different Activation Functions for Anomalous Sound Detection Speed Up Functional Coverage Closure of CORDIC Designs Using Machine Learning Models Lightweight Image Encryption: Cellular Automata and the Lorenz System Double Gate TFET with Germanium Pocket and Metal drain using Dual Oxide
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1