24,254 research outputs found
Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are of interest in a variety of contexts such as speeding up the computations of a network server or providing authentication in small electronic devices such as RFID tags. Provably secure hash functions, the security of which relies
on the hardness of a mathematical problem, are particularly appealing for security, but they used to be too inefficient in practice. In this paper, we study the efficiency
in hardware of ZT\u27, a provably secure hash function based on the Zémor-Tillich hash function. We consider three kinds of implementations targeting a high throughput and a low area in different ways. We first present a high-speed implementation of ZT\u27 on
FPGA that is nearly half as efficient as state-of-the-art SHA implementations in terms of throughput per area. We then focus on area reduction and present an ASIC implementation of ZT\u27 with much smaller area costs than SHA-1 and even than SQUASH, which was specially designed for low-cost RFID tags. Between these two extreme implementations, we show that the throughput and area can be traded with a lot of flexibility. Finally, we show that the inherent parallelism of ZT\u27 makes it particularly suitable for applications requiring high speed hashing of very long messages. Our work,
together with existing reasonably efficient software implementations, shows that this variant of the Zémor-Tillich hash function is in fact very practical for a wide range of applications, while having a security related to the hardness of a mathematical problem
and significant additional advantages such as scalability and parallelism
Efficient hardware implementations of high throughput SHA-3 candidates keccak, luffa and blue midnight wish for single- and multi-message hashing
In November 2007 NIST announced that it would organize the SHA-3 competition to select a new cryptographic hash function family by 2012. In the selection process, hardware performances of the candidates will play an important role. Our analysis of previously proposed hardware implementations shows that three SHA-3 candidate algorithms can provide superior performance in hardware: Keccak, Luffa and Blue Midnight Wish (BMW). In this paper, we provide efficient and fast hardware implementations of these three algorithms. Considering both single- and multi-message hashing applications with an emphasis on both speed and efficiency, our work presents more comprehensive analysis of their hardware performances by providing different performance figures for different target devices. To our best knowledge, this is the first work that provides a comparative analysis of SHA-3 candidates in multi-message applications. We discover that BMW algorithm can provide much higher throughput than previously reported if used in multi-message hashing. We also show that better utilization of resources can increase speed via different configurations. We implement our designs using Verilog HDL, and map to both ASIC and FPGA devices (Spartan3, Virtex2, and Virtex 4) to give a better comparison with those in the literature. We report total area, maximum frequency, maximum throughput and throughput/area of the designs for all target devices. Given that the selection process for SHA3 is still open; our results will be instrumental to evaluate the hardware performance of the candidates
Efficient Implementation on Low-Cost SoC-FPGAs of TLSv1.2 Protocol with ECC_AES Support for Secure IoT Coordinators
Security management for IoT applications is a critical research field, especially when taking into account the performance variation over the very different IoT devices. In this paper, we present high-performance client/server coordinators on low-cost SoC-FPGA devices for secure IoT data collection. Security is ensured by using the Transport Layer Security (TLS) protocol based on the TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 cipher suite. The hardware architecture of the proposed coordinators is based on SW/HW co-design, implementing within the hardware accelerator core Elliptic Curve Scalar Multiplication (ECSM), which is the core operation of Elliptic Curve Cryptosystems (ECC). Meanwhile, the control of the overall TLS scheme is performed in software by an ARM Cortex-A9 microprocessor. In fact, the implementation of the ECC accelerator core around an ARM microprocessor allows not only the improvement of ECSM execution but also the performance enhancement of the overall cryptosystem. The integration of the ARM processor enables to exploit the possibility of embedded Linux features for high system flexibility. As a result, the proposed ECC accelerator requires limited area, with only 3395 LUTs on the Zynq device used to perform high-speed, 233-bit ECSMs in 413 µs, with a 50 MHz clock. Moreover, the generation of a 384-bit TLS handshake secret key between client and server coordinators requires 67.5 ms on a low cost Zynq 7Z007S device
A Mobile Geo-Communication Dataset for Physiology-Aware DASH in Rural Ambulance Transport
Use of telecommunication technologies for remote, continuous monitoring of
patients can enhance effectiveness of emergency ambulance care during transport
from rural areas to a regional center hospital. However, the communication
along the various routes in rural areas may have wide bandwidth ranges from 2G
to 4G; some regions may have only lower satellite bandwidth available.
Bandwidth fluctuation together with real-time communication of various clinical
multimedia pose a major challenge during rural patient ambulance transport.;
AB@The availability of a pre-transport route-dependent communication bandwidth
database is an important resource in remote monitoring and clinical multimedia
transmission in rural ambulance transport. Here, we present a geo-communication
dataset from extensive profiling of 4 major US mobile carriers in Illinois,
from the rural location of Hoopeston to the central referral hospital center at
Urbana. In collaboration with Carle Foundation Hospital, we developed a
profiler, and collected various geographical and communication traces for
realistic emergency rural ambulance transport scenarios. Our dataset is to
support our ongoing work of proposing "physiology-aware DASH", which is
particularly useful for adaptive remote monitoring of critically ill patients
in emergency rural ambulance transport. It provides insights on ensuring higher
Quality of Service (QoS) for most critical clinical multimedia in response to
changes in patients' physiological states and bandwidth conditions. Our dataset
is available online for research community.Comment: Proceedings of the 8th ACM on Multimedia Systems Conference
(MMSys'17), Pages 158-163, Taipei, Taiwan, June 20 - 23, 201
Recommended from our members
Ubiquitous Internet in an integrated satellite-terrestrial environment: The SUITED solution
yesThe current Internet architecture appears to
not be particularly suited to addressing the
emerging needs of new classes of users who wish
to gain access to multimedia services made available
by ISPs, regardless of their location, while
in motion and with a guaranteed level of quality.
One of the main objectives of so-called nextgeneration
systems is to overcome the limitations
of today¿s available Internet by adopting an
approach based on the integration of different
mobile and fixed networks. The SUITED project
moves in this direction since it aims at contributing
to the design and deployment of the global
mobile broadband system (GMBS), a unique
satellite/terrestrial infrastructure ensuring
nomadic users access to Internet services with a
negotiated QoS. A description of the main features
of the GMBS architecture, characterized
by the integration of a multisegment access network
with a federated ISP network is given in
this article. The GMBS multimode terminal is
schematically described, and an overview of the
so-called QoS-aware mobility management
scheme, devised for such a heterogeneous scenario,is provided
- …