Analysis of Pipelined KATAN Ciphers under Handle-C for FPGAs

05/13/2019
by   Palwasha Shaikh, et al.
0

Embedded Systems are everywhere from the smartphones we hold in our hands to the satellites that hover around the earth. These embedded systems are being increasingly integrated into our personal and commercial infrastructures. More than 98 than traditional computers. As a result, security in embedded systems now more than ever has become a major concern. Since embedded systems are designed to be low-cost, fast and real-time, it would be appropriate to use tiny, lightweight and highly secure cryptographic algorithms. KATAN and KATANTAN family of light-weight block ciphers are promising cryptographic options. In this paper, a sequential hardware design is developed under Handel-C. Taking a step further, Handel-C's parallel construct is taken advantage of to develop a parallel-pipelined hybrid implementation. Both sequential and parallel-pipelined implementations are tested under Altera Quartus to implement and analyze hardware designs in conjunction with DK Design Suite's Handel-C compiler. The developed designs are mapped to Altera's Stratix II that is one of the industry's highest bandwidth and density FPGAs. The results confirm that using Handel-C can provide faster implementations. The obtained results are promising and show better performance when compared with similar implementations-specifically the developed parallel-pipelined processor.

READ FULL TEXT
research
02/15/2020

High-speed KATAN Ciphers on-a-Chip

Security in embedded systems has become a main requirement in modern ele...
research
04/07/2019

Parallel Algorithms Development for Programmable Devices with Application from Cryptography

Reconfigurable devices, such as Field Programmable Gate Arrays (FPGAs), ...
research
04/09/2019

Parallel Hardware for Faster Morphological Analysis

Morphological analysis in the Arabic language is computationally intensi...
research
10/11/2022

Automatic Real-time Vehicle Classification by Image Colour Component Based Template Matching

Selection of appropriate template matching algorithms to run effectively...
research
06/06/2022

ASAP: Reconciling Asynchronous Real-Time Operations and Proofs of Execution in Simple Embedded Systems

Embedded devices are increasingly ubiquitous and their importance is har...
research
03/05/2023

A Provably Secure Strong PUF based on LWE: Construction and Implementation

We construct a strong PUF with provable security against ML attacks on b...

Please sign up or login with your details

Forgot password? Click here to reset