Araştırma Makalesi
BibTex RIS Kaynak Göster

Custom TTA Operations for Accelerating the Ascon Encryption Algorithm

Yıl 2024, Cilt: 7 Sayı: 2, 123 - 132, 31.12.2024

Öz

Lightweight cryptography is becoming increasingly important in modern applications, especially in resource-constrained environments such as Internet of Things (IoT) devices, embedded systems and mobile platforms. The Ascon encryption algorithm is a modern, secure and efficient cryptographic scheme that meets the demands of low-power devices. However, some steps of the algorithm are computationally intensive, leading to performance issues. In this study, custom operations are proposed to accelerate the Ascon encryption algorithm on Transport-Triggered Architecture (TTA) processors. In order to make more efficient use of hardware resources, the custom operations are designed to have low complexity and high efficiency. The OpenASIP tool was employed to integrate the operations into a general purpose 64-bit TTA processor. The resulting application-specific core was implemented in Hardware Description Language (HDL) and synthesised for FPGA. The performance gain is analysed for different transport bus configurations. The results obtained show that the Ascon-AEAD128 encryption and decryption phases are accelerated by 38% to 50%. When evaluated together with the synthesis results, a significant performance gain was achieved with a very reasonable increase in hardware resources. The study also emphasises that the TTA is a suitable method for accelerating cryptographic applications that require low power consumption and high efficiency.

Kaynakça

  • [1] W. J. Buchanan, S. Li, and R. Asif, “Lightweight cryptography methods,” J. Cyber Secur. Technol., vol. 1, no. 3–4, pp. 187–201, 2017. https://doi.org/10.1080/23742917.2017.1384917
  • [2] K. Mohajerani, L. Beckwith, A. Abdulgadir, J.-P. Kaps, and K. Gaj, “Lightweight champions of the world: Side-channel resistant open hardware for finalists in the NIST Lightweight Cryptography Standardization Process,” ACM Trans. Embed. Comput. Syst., 2024. https://doi.org/10.1145/3677320
  • [3] Sonmez Turan M, McKay K, Chang D, Bassham LE, Kang J, Waller ND, Kelsey JM, Hong D, “Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process,” (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8454., 2023. https://doi.org/10.6028/NIST.IR.8454.
  • [4] C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer, “Ascon v1.2: Lightweight authenticated encryption and hashing” J. Cryptology, vol. 34, no. 3, 2021. https://doi.org/10.1007/s00145-021-09398-9
  • [5] C. Shekhar, Raj Singh, A. S. Mandal, S. C. Bose, R. Saini and P. Tanwar, "Application Specific Instruction Set Processors: redefining hardware-software boundary," 17th International Conference on VLSI Design. Proceedings., Mumbai, India, 2004, pp. 915-918, doi: 10.1109/ICVD.2004.1261047.
  • [6] H. Corporaal and M. Arnold, “Using transport triggered architectures for embedded processor design,” Integr. Comput. Aided Eng., vol. 5, no. 1, pp. 19–38, 1998. doi: 10.3233/ICA-1998-5103
  • [7] P. Hamalainen, J. Heikkinen, M. Hannikainen and T. D. Hamalainen, "Design of transport triggered architecture processors for wireless encryption," 8th Euromicro Conference on Digital System Design (DSD'05), Porto, Portugal, 2005, pp. 144-152, doi: 10.1109/DSD.2005.33.
  • [8] P. Hamalainen, M. Hannikainen, T. Hamalainen, H. Corporaal and J. Saarvinen, "Implementation of encryption algorithms on transport triggered architectures," ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems (Cat. No.01CH37196), Sydney, NSW, Australia, 2001, pp. 726-729 vol. 4, doi: 10.1109/ISCAS.2001.922340.
  • [9] T. Viitanen, H. Kultala, P. Jääskeläinen, and J. Takala, “Heuristics for greedy transport triggered architecture interconnect exploration,” in Proceedings of the 2014 International Conference on Compilers, Architecture and Synthesis for Embedded Systems, 2014. https://doi.org/10.1145/2656106.265612
  • [10] El-Hadidi, M. T., Elsayed, H. M., Osama, K., Bakr, M., & Aslan, H. K. (2018). Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm. Journal of Advanced Research, 12, 67–78. https://doi.org/10.1016/j.jare.2017.11.002
  • [11] Multanen, J., Kultala, H., Jaaskelainen, P., Viitanen, T., Tervo, A., & Takala, J. (2018). LoTTA: Energyefficient processor for always-on applications. 2018 IEEE International Workshop on Signal Processing Systems (SiPS). https://doi.org/10.1109/SiPS.2018.8598408.
  • [12] W. Guo, Y. Liu, S. Bai, J. Wei, and D. Sun, “Hardware architecture for RSA cryptography based on residue number system,”Trans. Tianjin Univ., vol. 18, no. 4, pp. 237–242, 2012. doi:10.1007/s12209-012-1902-7
  • [13] A. Hakkala, J. Isoaho, and S. Virtanen, “Towards adaptive cryptography and security with software defined platforms,” in Computing Platforms for Software-Defined Radio, Cham: Springer International Publishing, 2017, pp. 209–236. https://doi.org/10.1007/978-3-319-49679-5_11
  • [14] J. Wei, W. Guo, H. Liu, and Y. Tan, “A Unified Cryptographic Processor for RSA and ECC in RNS,” in Communications in Computer and Information Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 19–32. https://doi.org/10.1007/978-3-642-41635-4_3
  • [15] J. Hu, W. Guo, J. Wei, Y. Chang and D. Sun, "A Novel Architecture for Fast RSA Key Generation Based on RNS," 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming, Tianjin, China, 2011, pp. 345-349, doi: 10.1109/PAAP.2011.75.
  • [16] L. Akçay and B. Ö. Yalçın, “Analysing the potential of transport triggered architecture for lattice-based cryptography algorithms,” International Journal of Embedeed Systems, vol. 15, no. 5, p. 404, 2022.https://doi.org/10.1504/IJES.2022.127164
  • [17] L. Akcay and B. Ors, “Custom TTA operations for accelerating kyber algorithm,” in 2021 13th International Conference on Electrical and Electronics Engineering (ELECO), 2021. doi: 10.23919/ELECO54474.2021.9677863.
  • [18] L. Akçay and B. Ö. Yalçın, "Lightweight ASIP Design for Lattice-Based Post-quantum Cryptography Algorithms," Arabian Journal for Science and Engineering, 1-15. https://doi.org/10.1007/s13369-024-08976-w
  • [19] Akçay, L., & Örs, B. (2021). Comparison of RISC-V and transport triggered architectures for a postquantum cryptography application. Turkish Journal of Electrical Engineering & Computer Sciences, 29(1), 321–333. https://doi.org/10.3906/elk-2003-27
  • [20] F. Abed, C. Forler, and S. Lucks, “General classification of the authenticated encryption schemes for the CAESAR competition,” Computer Science Review., volume 22, pp. 13–26, 2016. https://doi.org/10.1016/j.cosrev.2016.07.002
  • [21] J. A. Fisher, “Very Long Instruction Word architectures and the ELI-512,” in Proceedings of the 10th annual international symposium on Computer architecture - ISCA ’83, 1983. https://doi.org/10.1145/800046.801649
  • [22] K. Hepola, J. Multanen and P. Jääskeläinen, "OpenASIP 2.0: Co-Design Toolset for RISC-V ApplicationSpecific Instruction-Set Processors," 2022 IEEE 33rd International Conference on Application-specific Systems, Architectures and Processors (ASAP), Gothenburg, Sweden, 2022, pp. 161-165, doi: 10.1109/ASAP54787.2022.00034.
  • [23] Ascon Team, “ascon/ascon_collection: A collection of Ascon implementations & documents (as submodules),” GitHub, 2014. https://github.com/ascon/ascon_collection (accessed Nov. 10, 2024).
  • [24] H. Modi and P. Athanas, “In-system testing of Xilinx 7-Series FPGAs: Part 1-logic,” in MILCOM 2015 -2015 IEEE Military Communications Conference, 2015.
  • [25] S. Chakraborty, “Vivado Design Tools,” Designing with Xilinx® FPGAs, pp. 17–21, Oct. 2016, doi: 10.1007/978-3-319-42438-5_2

Ascon Şifreleme Algoritmasını Hızlandırmak İçin Özel TTA Operasyonları

Yıl 2024, Cilt: 7 Sayı: 2, 123 - 132, 31.12.2024

Öz

Hafif kriptografi algoritmaları, özellikle Nesnelerin İnterneti (IoT) cihazları, gömülü sistemler ve mobil platformlar gibi kaynak kısıtlı ortamlarda, modern uygulamalarda giderek daha önemli hale geliyor. Ascon şifreleme algoritması, düşük güç tüketen cihazların taleplerini karşılayan modern, güvenli ve verimli bir kriptografik şemadır. Ancak, algoritmanın bazı adımları hesaplama açısından yoğun olup performans sorunlarına yol açmaktadır. Bu çalışmada, Transport-Triggered Architecture (TTA) işlemcilerde Ascon şifreleme algoritmasını hızlandırmak için özel operasyonlar önerilmiştir. Donanım kaynaklarının daha verimli kullanılması için, özel işlemler düşük karmaşıklık ve yüksek verimliliğe sahip olacak şekilde tasarlanmıştır. İşlemleri genel amaçlı 64 bitlik bir TTA işlemcisine entegre etmek için OpenASIP aracı kullanılmıştır. Elde edilen uygulamaya özgü çekirdek, Donanım Tanımlama Dili'nde (HDL) gerçeklenmiş ve FPGA için sentezlenmiştir. Farklı taşıma veri yolu yapılandırmaları için performans kazanımını analiz edilmektedir. Elde edilen sonuçlar, Ascon-AEAD128 şifreleme ve şifre çözme aşamalarının %38 ila %50 oranında hızlandırıldığını göstermektedir. Sentez sonuçlarıyla birlikte değerlendirildiğinde, donanım kaynaklarında oldukça makul bir artışla önemli bir performans artışı elde edildi. Çalışma ayrıca TTA'nın düşük güç tüketimi ve yüksek verimlilik gerektiren kriptografik uygulamaları hızlandırmak için uygun bir yöntem olduğunu vurgulamaktadır.

Kaynakça

  • [1] W. J. Buchanan, S. Li, and R. Asif, “Lightweight cryptography methods,” J. Cyber Secur. Technol., vol. 1, no. 3–4, pp. 187–201, 2017. https://doi.org/10.1080/23742917.2017.1384917
  • [2] K. Mohajerani, L. Beckwith, A. Abdulgadir, J.-P. Kaps, and K. Gaj, “Lightweight champions of the world: Side-channel resistant open hardware for finalists in the NIST Lightweight Cryptography Standardization Process,” ACM Trans. Embed. Comput. Syst., 2024. https://doi.org/10.1145/3677320
  • [3] Sonmez Turan M, McKay K, Chang D, Bassham LE, Kang J, Waller ND, Kelsey JM, Hong D, “Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process,” (National Institute of Standards and Technology, Gaithersburg, MD), NIST Interagency or Internal Report (IR) NIST IR 8454., 2023. https://doi.org/10.6028/NIST.IR.8454.
  • [4] C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schläffer, “Ascon v1.2: Lightweight authenticated encryption and hashing” J. Cryptology, vol. 34, no. 3, 2021. https://doi.org/10.1007/s00145-021-09398-9
  • [5] C. Shekhar, Raj Singh, A. S. Mandal, S. C. Bose, R. Saini and P. Tanwar, "Application Specific Instruction Set Processors: redefining hardware-software boundary," 17th International Conference on VLSI Design. Proceedings., Mumbai, India, 2004, pp. 915-918, doi: 10.1109/ICVD.2004.1261047.
  • [6] H. Corporaal and M. Arnold, “Using transport triggered architectures for embedded processor design,” Integr. Comput. Aided Eng., vol. 5, no. 1, pp. 19–38, 1998. doi: 10.3233/ICA-1998-5103
  • [7] P. Hamalainen, J. Heikkinen, M. Hannikainen and T. D. Hamalainen, "Design of transport triggered architecture processors for wireless encryption," 8th Euromicro Conference on Digital System Design (DSD'05), Porto, Portugal, 2005, pp. 144-152, doi: 10.1109/DSD.2005.33.
  • [8] P. Hamalainen, M. Hannikainen, T. Hamalainen, H. Corporaal and J. Saarvinen, "Implementation of encryption algorithms on transport triggered architectures," ISCAS 2001. The 2001 IEEE International Symposium on Circuits and Systems (Cat. No.01CH37196), Sydney, NSW, Australia, 2001, pp. 726-729 vol. 4, doi: 10.1109/ISCAS.2001.922340.
  • [9] T. Viitanen, H. Kultala, P. Jääskeläinen, and J. Takala, “Heuristics for greedy transport triggered architecture interconnect exploration,” in Proceedings of the 2014 International Conference on Compilers, Architecture and Synthesis for Embedded Systems, 2014. https://doi.org/10.1145/2656106.265612
  • [10] El-Hadidi, M. T., Elsayed, H. M., Osama, K., Bakr, M., & Aslan, H. K. (2018). Optimization of a novel programmable data-flow crypto processor using NSGA-II algorithm. Journal of Advanced Research, 12, 67–78. https://doi.org/10.1016/j.jare.2017.11.002
  • [11] Multanen, J., Kultala, H., Jaaskelainen, P., Viitanen, T., Tervo, A., & Takala, J. (2018). LoTTA: Energyefficient processor for always-on applications. 2018 IEEE International Workshop on Signal Processing Systems (SiPS). https://doi.org/10.1109/SiPS.2018.8598408.
  • [12] W. Guo, Y. Liu, S. Bai, J. Wei, and D. Sun, “Hardware architecture for RSA cryptography based on residue number system,”Trans. Tianjin Univ., vol. 18, no. 4, pp. 237–242, 2012. doi:10.1007/s12209-012-1902-7
  • [13] A. Hakkala, J. Isoaho, and S. Virtanen, “Towards adaptive cryptography and security with software defined platforms,” in Computing Platforms for Software-Defined Radio, Cham: Springer International Publishing, 2017, pp. 209–236. https://doi.org/10.1007/978-3-319-49679-5_11
  • [14] J. Wei, W. Guo, H. Liu, and Y. Tan, “A Unified Cryptographic Processor for RSA and ECC in RNS,” in Communications in Computer and Information Science, Berlin, Heidelberg: Springer Berlin Heidelberg, 2013, pp. 19–32. https://doi.org/10.1007/978-3-642-41635-4_3
  • [15] J. Hu, W. Guo, J. Wei, Y. Chang and D. Sun, "A Novel Architecture for Fast RSA Key Generation Based on RNS," 2011 Fourth International Symposium on Parallel Architectures, Algorithms and Programming, Tianjin, China, 2011, pp. 345-349, doi: 10.1109/PAAP.2011.75.
  • [16] L. Akçay and B. Ö. Yalçın, “Analysing the potential of transport triggered architecture for lattice-based cryptography algorithms,” International Journal of Embedeed Systems, vol. 15, no. 5, p. 404, 2022.https://doi.org/10.1504/IJES.2022.127164
  • [17] L. Akcay and B. Ors, “Custom TTA operations for accelerating kyber algorithm,” in 2021 13th International Conference on Electrical and Electronics Engineering (ELECO), 2021. doi: 10.23919/ELECO54474.2021.9677863.
  • [18] L. Akçay and B. Ö. Yalçın, "Lightweight ASIP Design for Lattice-Based Post-quantum Cryptography Algorithms," Arabian Journal for Science and Engineering, 1-15. https://doi.org/10.1007/s13369-024-08976-w
  • [19] Akçay, L., & Örs, B. (2021). Comparison of RISC-V and transport triggered architectures for a postquantum cryptography application. Turkish Journal of Electrical Engineering & Computer Sciences, 29(1), 321–333. https://doi.org/10.3906/elk-2003-27
  • [20] F. Abed, C. Forler, and S. Lucks, “General classification of the authenticated encryption schemes for the CAESAR competition,” Computer Science Review., volume 22, pp. 13–26, 2016. https://doi.org/10.1016/j.cosrev.2016.07.002
  • [21] J. A. Fisher, “Very Long Instruction Word architectures and the ELI-512,” in Proceedings of the 10th annual international symposium on Computer architecture - ISCA ’83, 1983. https://doi.org/10.1145/800046.801649
  • [22] K. Hepola, J. Multanen and P. Jääskeläinen, "OpenASIP 2.0: Co-Design Toolset for RISC-V ApplicationSpecific Instruction-Set Processors," 2022 IEEE 33rd International Conference on Application-specific Systems, Architectures and Processors (ASAP), Gothenburg, Sweden, 2022, pp. 161-165, doi: 10.1109/ASAP54787.2022.00034.
  • [23] Ascon Team, “ascon/ascon_collection: A collection of Ascon implementations & documents (as submodules),” GitHub, 2014. https://github.com/ascon/ascon_collection (accessed Nov. 10, 2024).
  • [24] H. Modi and P. Athanas, “In-system testing of Xilinx 7-Series FPGAs: Part 1-logic,” in MILCOM 2015 -2015 IEEE Military Communications Conference, 2015.
  • [25] S. Chakraborty, “Vivado Design Tools,” Designing with Xilinx® FPGAs, pp. 17–21, Oct. 2016, doi: 10.1007/978-3-319-42438-5_2
Toplam 25 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Dijital İşlemci Mimarileri, Gömülü Sistemler, Sayısal Tasarım
Bölüm Araştırma Makaleleri
Yazarlar

Latif Akçay 0000-0003-2580-2643

Yayımlanma Tarihi 31 Aralık 2024
Gönderilme Tarihi 11 Kasım 2024
Kabul Tarihi 9 Aralık 2024
Yayımlandığı Sayı Yıl 2024 Cilt: 7 Sayı: 2

Kaynak Göster

APA Akçay, L. (2024). Custom TTA Operations for Accelerating the Ascon Encryption Algorithm. Bayburt Üniversitesi Fen Bilimleri Dergisi, 7(2), 123-132. https://doi.org/10.55117/bufbd.1582809
AMA Akçay L. Custom TTA Operations for Accelerating the Ascon Encryption Algorithm. Bayburt Üniversitesi Fen Bilimleri Dergisi. Aralık 2024;7(2):123-132. doi:10.55117/bufbd.1582809
Chicago Akçay, Latif. “Custom TTA Operations for Accelerating the Ascon Encryption Algorithm”. Bayburt Üniversitesi Fen Bilimleri Dergisi 7, sy. 2 (Aralık 2024): 123-32. https://doi.org/10.55117/bufbd.1582809.
EndNote Akçay L (01 Aralık 2024) Custom TTA Operations for Accelerating the Ascon Encryption Algorithm. Bayburt Üniversitesi Fen Bilimleri Dergisi 7 2 123–132.
IEEE L. Akçay, “Custom TTA Operations for Accelerating the Ascon Encryption Algorithm”, Bayburt Üniversitesi Fen Bilimleri Dergisi, c. 7, sy. 2, ss. 123–132, 2024, doi: 10.55117/bufbd.1582809.
ISNAD Akçay, Latif. “Custom TTA Operations for Accelerating the Ascon Encryption Algorithm”. Bayburt Üniversitesi Fen Bilimleri Dergisi 7/2 (Aralık 2024), 123-132. https://doi.org/10.55117/bufbd.1582809.
JAMA Akçay L. Custom TTA Operations for Accelerating the Ascon Encryption Algorithm. Bayburt Üniversitesi Fen Bilimleri Dergisi. 2024;7:123–132.
MLA Akçay, Latif. “Custom TTA Operations for Accelerating the Ascon Encryption Algorithm”. Bayburt Üniversitesi Fen Bilimleri Dergisi, c. 7, sy. 2, 2024, ss. 123-32, doi:10.55117/bufbd.1582809.
Vancouver Akçay L. Custom TTA Operations for Accelerating the Ascon Encryption Algorithm. Bayburt Üniversitesi Fen Bilimleri Dergisi. 2024;7(2):123-32.

Taranılan Dizinler