Hash Functions and Benchmarks for Resource Constrained Passive Devices: A Preliminary Study

02/08/2019
by   Yang Su, et al.
0

Recently, we have witnessed the emergence of intermittently powered computational devices, an early example is the Intel WISP (Wireless Identification and Sensing Platform). How we engineer basic security services to realize mutual authentication, confidentiality and preserve privacy of information collected, stored and transmitted by, and establish the veracity of measurements taken from, such devices remain an open challenge; especially for batteryless and intermittently powered devices. While the cryptographic community has significantly progressed lightweight (in terms of area overhead) security primitives for low cost and power efficient hardware implementations, lightweight software implementations of security primitives for resource constrained devices are less investigated. Especially, the problem of providing security for intermittently powered computational devices is unexplored. In this paper, we illustrate the unique challenges posed by an emerging class of intermittently powered and energy constrained computational IoT devices for engineering security solutions. We focus on the construction and evaluation of a basic hash primitive---both existing cryptographic hash functions and non-cryptographic hash functions built upon lightweight block ciphers. We provide software implementation benchmarks for eight primitives on a low power and resource limited computational device, and outline an execution model for these primitives under intermittent powering.

READ FULL TEXT
research
02/08/2019

Building Secure SRAM PUF Key Generators on Resource Constrained Devices

A securely maintained key is the premise upon which data stored and tran...
research
08/06/2022

Analysis of lightweight cryptographic solutions for authentication in IoT

Currently, special attention is being paid to scenarios where the interc...
research
04/15/2019

IMD Security vs. Energy: Are We Tilting at Windmills?: POSTER

Implantable Medical Devices (IMDs) such as pacemakers and neurostimulato...
research
04/15/2019

POSTER: IMD Security vs. Energy: Are we tilting at windmills?

Implantable Medical Devices (IMDs) such as pacemakers and neurostimulato...
research
04/17/2018

Lightweight Hardware Architectures for Efficient Secure Hash Functions ECHO and Fugue

In cryptographic engineering, extensive attention has been devoted to am...
research
10/04/2022

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Physical Unclonable Functions (PUFs) are promising security primitives f...
research
07/27/2018

SecuCode: Intrinsic PUF Entangled Secure Wireless Code Dissemination for Computational RFID Devices

The simplicity of deployment and perpetual operation of energy harvestin...

Please sign up or login with your details

Forgot password? Click here to reset