Konferans Bildirisi

FPGA Hardware Implementation of a SHA384 Accelerator for Internet of Things Applications

Sayı: 26 31 Temmuz 2021
PDF İndir
TR EN

FPGA Hardware Implementation of a SHA384 Accelerator for Internet of Things Applications

Abstract

The abundance of the IoT devices surrounding us brings new opportunities and challenges. IoT technology enables remote monitoring and control of cyber-physical systems on a global scale. One key aspect of IoT technology is the security which is usually neglected by manufacturers. Because of IoT based security breaches, IoT devices need cryptographic functions to provide confidentiality, integrity and authentication capabilities in modern applications. However, the limited computational power available in the processors used in IoT systems imposes the development and use of hardware peripherals dedicated for performing cryptographic operations. One of the most popular cryptographic functions used in the IoT applications is the secure hash algorithms. They are extensively used for data integrity and authentication applications. In this work, we have designed, verified, and implemented a hardware IP core of the SHA-384 algorithm. In addition, we have also integrated the SHA-384 hardware module with a synthesizable processor as an AXI4 peripheral to enable in-application testing using custom software. Our design can operate up to 170 MHz and occupies only 982 CLB slices and one BRAM on a Xilinx Artix-7 FPGA device. The estimated total power consumption is 223 mW when the module is integrated with a minimal configuration Microblaze processor system.

Keywords

Kaynakça

  1. Statista. (2016, November 27). Internet of Things - number of connected devices worldwide 2015-2025. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ (Accessed Feb 2, 2021).
  2. CISO Magazine. (2020, January 10). 10 IoT Security Incidents That Make You Feel Less Secure. https://cisomag.eccouncil.org/10-iot-security-incidents-that-make-you-feel-less-secure/ (Accessed Feb 2, 2021).
  3. Bellare M., Canetti R., Krawczyk H. (1996) Keying Hash Functions for Message Authentication. In: Koblitz N. (eds) Advances in Cryptology — CRYPTO ’96. CRYPTO 1996. Lecture Notes in Computer Science, vol 1109. Springer, Berlin, Heidelberg.
  4. Dang Q. (2008, July). The Keyed-Hash Message Authentication Code (HMAC), Federal Inf. Process. Stds. (NIST FIPS 198-1), National Institute of Standards and Technology, Gaithersburg, MD, https://doi.org/10.6028/NIST.FIPS.198-1.
  5. National Institute of Standards and Technology (2015, August) Secure Hash Standard (SHS), Federal Inf. Process. Stds. (NIST FIPS 180-4), National Institute of Standards and Technology, Gaithersburg, MD, https://doi.org/10.6028/NIST.FIPS.180-4.
  6. Lenstra, A. (2005, February 26). Further progress in hashing cryptanalysis. Lucent Bell Laboratories, http://bell-labs.co/who/akl/hash.pdf (Accessed Feb 4, 2021).
  7. Sklavos N., Koufopavlou O. (2003). On the hardware implementation of the SHA-2 (256, 384, 512) Hash functions. In 2003 International Symposium on Circuits and Systems (ISCAS), (pp.153-156). IEEE. https://doi.org/10.1109/ISCAS.2003.1206214.
  8. McLoone M., McCanny J. V. (2003, March 26). Efficient single-chip implementation of SHA-384 and SHA-512, In 2002 International Conference on Field-Programmable Technology (FPT), (pp. 311-314,). IEEE. https://doi.org/10.1109/FPT.2002.1188699.

Ayrıntılar

Birincil Dil

İngilizce

Konular

Mühendislik

Bölüm

Konferans Bildirisi

Yayımlanma Tarihi

31 Temmuz 2021

Gönderilme Tarihi

15 Haziran 2021

Kabul Tarihi

23 Haziran 2021

Yayımlandığı Sayı

Yıl 2021 Sayı: 26

Kaynak Göster

APA
Cicek, I. (2021). FPGA Hardware Implementation of a SHA384 Accelerator for Internet of Things Applications. Avrupa Bilim ve Teknoloji Dergisi, 26, 128-132. https://doi.org/10.31590/ejosat.951580