Konferans Bildirisi
BibTex RIS Kaynak Göster

Nesnelerin İnterneti Uygulamaları İçin Bir SHA-384 Hızlandırıcısının FPGA Donanım Gerçeklemesi

Yıl 2021, Sayı: 26 - Ejosat Özel Sayı 2021 (HORA), 128 - 132, 31.07.2021
https://doi.org/10.31590/ejosat.951580

Öz

Çevremizdeki IoT cihazlarının bolluğu yeni fırsatları ve zorlukları getiriyor. IoT teknolojisi, siber-fiziksel sistemlerin küresel ölçekte uzaktan izlenmesini ve kontrolünü sağlamaktadır. IoT teknolojisinin önemli bir yönü, genellikle üreticiler tarafından ihmal edilen güvenliktir. güvenlik ihlalleri nedeniyle IoT cihazları, modern uygulamalarda gizlilik, bütünlük ve kimlik doğrulama yetenekleri sağlamak için kriptografik işlevlere ihtiyaç duyar. Bununla birlikte, IoT sistemlerinde kullanılan işlemcilerin sınırlı hesaplama gücü, kriptografik işlemleri gerçekleştirmek için adanmış donanım çevre birimlerinin geliştirilmesini ve kullanılmasını zorunlu kılar. IoT uygulamalarında kullanılan en popüler kriptografik işlevlerden biri güvenli özet algoritmalarıdır. Veri bütünlüğü ve kimlik doğrulama uygulamaları için yaygın olarak kullanılırlar. Bu çalışmada, SHA-384 algoritmasını bir donanım çekirdeği şeklinde tasarladık, doğruladık ve gerçekledik. Ek olarak, özel yazılım kullanarak uygulama içi testler yapabilmek için SHA-384 donanım modülünü bir AXI4 çevre birimi olarak sentezlenebilir bir işlemci ile entegre ettik. Tasarımımız 170 MHz'e kadar çalışabilmektedir ve bir Xilinx Artix-7 FPGA tümleşik devresinde yalnızca 982 CLB dilimi ve bir BRAM kaplamaktadır. Modül minimum konfigürasyonlu Microblaze işlemci sistemiyle entegre edildiğinde tahmini olarak toplam 223 mW güç tüketmektedir.

Kaynakça

  • Statista. (2016, November 27). Internet of Things - number of connected devices worldwide 2015-2025. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ (Accessed Feb 2, 2021).
  • CISO Magazine. (2020, January 10). 10 IoT Security Incidents That Make You Feel Less Secure. https://cisomag.eccouncil.org/10-iot-security-incidents-that-make-you-feel-less-secure/ (Accessed Feb 2, 2021).
  • Bellare M., Canetti R., Krawczyk H. (1996) Keying Hash Functions for Message Authentication. In: Koblitz N. (eds) Advances in Cryptology — CRYPTO ’96. CRYPTO 1996. Lecture Notes in Computer Science, vol 1109. Springer, Berlin, Heidelberg.
  • Dang Q. (2008, July). The Keyed-Hash Message Authentication Code (HMAC), Federal Inf. Process. Stds. (NIST FIPS 198-1), National Institute of Standards and Technology, Gaithersburg, MD, https://doi.org/10.6028/NIST.FIPS.198-1.
  • National Institute of Standards and Technology (2015, August) Secure Hash Standard (SHS), Federal Inf. Process. Stds. (NIST FIPS 180-4), National Institute of Standards and Technology, Gaithersburg, MD, https://doi.org/10.6028/NIST.FIPS.180-4.
  • Lenstra, A. (2005, February 26). Further progress in hashing cryptanalysis. Lucent Bell Laboratories, http://bell-labs.co/who/akl/hash.pdf (Accessed Feb 4, 2021).
  • Sklavos N., Koufopavlou O. (2003). On the hardware implementation of the SHA-2 (256, 384, 512) Hash functions. In 2003 International Symposium on Circuits and Systems (ISCAS), (pp.153-156). IEEE. https://doi.org/10.1109/ISCAS.2003.1206214.
  • McLoone M., McCanny J. V. (2003, March 26). Efficient single-chip implementation of SHA-384 and SHA-512, In 2002 International Conference on Field-Programmable Technology (FPT), (pp. 311-314,). IEEE. https://doi.org/10.1109/FPT.2002.1188699.
  • Li M., Xu J., Yang X., and Yang Z. (2009). Design and Implementation of Reconfigurable Security Hash Algorithms Based on FPGA. In 2009 WASE International Conference on Information Engineering, (pp. 381-384). IEEE. https://doi.org/10.1109/ICIE.2009.278.

FPGA Hardware Implementation of a SHA384 Accelerator for Internet of Things Applications

Yıl 2021, Sayı: 26 - Ejosat Özel Sayı 2021 (HORA), 128 - 132, 31.07.2021
https://doi.org/10.31590/ejosat.951580

Öz

The abundance of the IoT devices surrounding us brings new opportunities and challenges. IoT technology enables remote monitoring and control of cyber-physical systems on a global scale. One key aspect of IoT technology is the security which is usually neglected by manufacturers. Because of IoT based security breaches, IoT devices need cryptographic functions to provide confidentiality, integrity and authentication capabilities in modern applications. However, the limited computational power available in the processors used in IoT systems imposes the development and use of hardware peripherals dedicated for performing cryptographic operations. One of the most popular cryptographic functions used in the IoT applications is the secure hash algorithms. They are extensively used for data integrity and authentication applications. In this work, we have designed, verified, and implemented a hardware IP core of the SHA-384 algorithm. In addition, we have also integrated the SHA-384 hardware module with a synthesizable processor as an AXI4 peripheral to enable in-application testing using custom software. Our design can operate up to 170 MHz and occupies only 982 CLB slices and one BRAM on a Xilinx Artix-7 FPGA device. The estimated total power consumption is 223 mW when the module is integrated with a minimal configuration Microblaze processor system.

Kaynakça

  • Statista. (2016, November 27). Internet of Things - number of connected devices worldwide 2015-2025. https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ (Accessed Feb 2, 2021).
  • CISO Magazine. (2020, January 10). 10 IoT Security Incidents That Make You Feel Less Secure. https://cisomag.eccouncil.org/10-iot-security-incidents-that-make-you-feel-less-secure/ (Accessed Feb 2, 2021).
  • Bellare M., Canetti R., Krawczyk H. (1996) Keying Hash Functions for Message Authentication. In: Koblitz N. (eds) Advances in Cryptology — CRYPTO ’96. CRYPTO 1996. Lecture Notes in Computer Science, vol 1109. Springer, Berlin, Heidelberg.
  • Dang Q. (2008, July). The Keyed-Hash Message Authentication Code (HMAC), Federal Inf. Process. Stds. (NIST FIPS 198-1), National Institute of Standards and Technology, Gaithersburg, MD, https://doi.org/10.6028/NIST.FIPS.198-1.
  • National Institute of Standards and Technology (2015, August) Secure Hash Standard (SHS), Federal Inf. Process. Stds. (NIST FIPS 180-4), National Institute of Standards and Technology, Gaithersburg, MD, https://doi.org/10.6028/NIST.FIPS.180-4.
  • Lenstra, A. (2005, February 26). Further progress in hashing cryptanalysis. Lucent Bell Laboratories, http://bell-labs.co/who/akl/hash.pdf (Accessed Feb 4, 2021).
  • Sklavos N., Koufopavlou O. (2003). On the hardware implementation of the SHA-2 (256, 384, 512) Hash functions. In 2003 International Symposium on Circuits and Systems (ISCAS), (pp.153-156). IEEE. https://doi.org/10.1109/ISCAS.2003.1206214.
  • McLoone M., McCanny J. V. (2003, March 26). Efficient single-chip implementation of SHA-384 and SHA-512, In 2002 International Conference on Field-Programmable Technology (FPT), (pp. 311-314,). IEEE. https://doi.org/10.1109/FPT.2002.1188699.
  • Li M., Xu J., Yang X., and Yang Z. (2009). Design and Implementation of Reconfigurable Security Hash Algorithms Based on FPGA. In 2009 WASE International Conference on Information Engineering, (pp. 381-384). IEEE. https://doi.org/10.1109/ICIE.2009.278.
Toplam 9 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Ihsan Cicek 0000-0002-7881-1263

Yayımlanma Tarihi 31 Temmuz 2021
Yayımlandığı Sayı Yıl 2021 Sayı: 26 - Ejosat Özel Sayı 2021 (HORA)

Kaynak Göster

APA Cicek, I. (2021). FPGA Hardware Implementation of a SHA384 Accelerator for Internet of Things Applications. Avrupa Bilim Ve Teknoloji Dergisi(26), 128-132. https://doi.org/10.31590/ejosat.951580