The Hardware Implementation of a Lightweight Block Cipher Algorithm and a Message Authentication Algorithm

Article Preview

Abstract:

Among the block cipher algorithms, AES or DES is an excellent and preferred choice for most block cipher applications. But AES and DES are not very suitable for hardware implementation because of the high cost that they require large areas of routing and the processing efficiency is low, relatively. So lightweight cipher algorithms come into beings, among which PRESENT is very competitive. Along with the structure of a message authentication algorithm ALRED, a new family of Tunable Lightweight MAC based on PRESENT is proposed, that is TuLP. However, PRESENT is not able to resist side channel attack, so is TuLP, of course. For the above reason, in this paper, we provide an improvement of PRESENT by inserting random dummy cycles as well as shuffling to strengthen the security of PRESENT against side channel attacks. We will implement PRESENT and TuLP in Verilog and do simulation on Xilinx ISim platform. At last, we would like to provide the power analyzing of Xilinx XPower.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 546-547)

Pages:

1489-1494

Citation:

Online since:

July 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, and C. Vikkelsoe, PRESENT: An Ultra-Lightweight Block Cipher.

DOI: 10.1007/978-3-540-74735-2_31

Google Scholar

[2] Zheng Gong, Pieter Hartel, Svetla Nikova, Shaohua Tang Member, and Bo Zhu, TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks.

DOI: 10.1007/s11390-013-1411-8

Google Scholar

[3] Stefan Mangard, Elisabeth Oswald, and Thomas Popp, Power Analysis Attacks.

Google Scholar

[4] Joan Daemen and Vincent Rijmen, A new MAC Construction Alred and a Specific Instance Alpha-MAC.

DOI: 10.1007/11502760_1

Google Scholar

[5] Thomas Eisenbarth, Christof Paar, Axel Poschmann, Sandeep Kumar and Leif Uhsadel, A Survey of Lightweight-Cryptography Implementations, Fig. 16 Simulation of PRESENT with plain=0x0000000000000000 and key=0x00000000000000000000 Fig. 17 Simulation of TuLP with message=0xFFD, key=0x00000000000000000000 and IV=0x0000000000000000.

DOI: 10.1109/mdt.2007.178

Google Scholar