Implementación de un cifrado avanzado con modo contador para sistema en chip FPGA de área pequeña
Resumen
Palabras clave
Referencias
J. K. Cheng, E. M. Lim, Y. Y. Krikorian, D. J. Sklar, and V. J. Kong, "A Survey of Encryption Standard and Potential Impact Due to Quantum Computing," The Aerospace Corporation, vol. 1, no. 1, pp. 1-10, 2023.
M. Althoff et al., "CRC-Oriented Error Detection Architectures of Post-Quantum Cryptography Niederreiter Key Generator on FPGA," Proceedings of the International Conference on Field-Programmable Technology (ICFPT), 2022.
P. Werner et al., "Error Detection Schemes Assessed on FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-Quantum Cryptography," IEEE Transactions on Computers, vol. 71, no. 4, pp. 751-764, 2022.
L. Chen, W. Ye, J. He, and X. Ma, "Vulnerability Assessment of Blockchain Using Confrontation Deduction," School of Electronics and Information Engineering, Tongji University, vol. 1, no. 1, pp. 1-10, 2023.
Y. Shen et al., "Lightweight Hardware Architectures for Fault Diagnosis Schemes of Efficiently-Maskable Cryptographic Substitution Boxes," in IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 69, no. 10, pp. 4203-4212, 2022.
S. Gajbhiye, S. Karmakar, M. Sharma, and S. Sharma, "Paradigm Shift from Classical Cryptography to Quantum Cryptography," CSE-FET, SSGI, SSTC, vol. 1, no. 1, pp. 1-10, 2023.
Circuits and Systems Conference (NorCAS), 2022. DOI: 10.1109/NorCAS57515.2022.9934378.
P. Sikka, A. R. Asati and C. Shekhar, "High-throughput field- programable gate array implementation of the advanced encryption standard algorithm for automotive security applications," Journal of Ambient Intelligence and Humanized Computing, 7, 2020.
E. M. Benhani, L. Bossuet and A. Aubert, "The Security of ARM TrustZone in a FPGA-Based SoC," IEEE Transactions on Computers, vol. 68, p. 1238–1248, 8 2019.
Y. Sovyn, V. Khoma, and M. Podpora, "Comparison of Three CPU-Core Families for IoT Applications in Terms of Security and Performance of AES-GCM," IEEE Internet of Things Journal, vol. 7, p. 339–348, 1 2020.
A. Silitonga, Z. Jiang, N. Khan, and J. Becker, "Reconfigurable Module of Multi-mode AES Cryptographic Algorithms for AP SoCs," in 2019 IEEE Nordic Circuits and Systems Conference (NORCAS): NORCHIP and International Symposium of System-on- Chip (SoC), 2019.
I. C. Guzmán, R. D. Nieto and Á. Bernal, "FPGA implementation of the AES-128 algorithm in non-feedback modes of operation," in DYNA, vol. 83, p. 37–43, 9 2016.
P. Visconti, S. Capoccia, E. Venere, R. Velázquez and R. de Fazio, "10 Clock-Periods Pipelined Implementation of AES-128 Encryption-Decryption Algorithm up to 28 Gbit/s Real Throughput by Xilinx Zynq UltraScale+ MPSoC ZCU102 Platform," in Electronics, vol. 9, p. 1665, 10 2020.
R. Cowart, D. Coe, J. Kulick, and A. Milenković, "An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs," in Proceedings of the SouthEast Conference, 2017.
L. Daoud, F. Hussein, and N. Rafla, "Optimization of Advanced Encryption Standard (AES) Using Vivado High-Level Synthesis (HLS)," 2019.
S. Chen, W. Hu, and Z. Li, "High-Performance Data Encryption with AES Implementation on FPGA," in 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), 2019.
S. Chhabra and K. Lata, "Hardware-Software Co-Simulation of Obfuscated 128-Bit AES Algorithm for Image Processing Applications," in 2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS), 2018.
R. V. Daemen, "The Design of Rijndael: AES - The Advanced Encryption Standard.," 2002. DOI: 10.1007/978-3-662-04722-4.
H. and R. P. and W. D. Lipmaa, " CTR-Mode Encryption.," 2001.
W. Stallings, “Cryptography and Network Security: Principles and Practice,” in Pearson, 2013.
Chegg, "Consider the five block cipher modes of operation shown in Table 6.1. For each mode, consider the case when cipher text block C1 is corrupted. Which plaintext blocks, when decrypted, are corrupted?" [Online]. Available: https://www.chegg.com/homework-help/questions-and- answers/1consider-five-block-cipher-modes-operation-shown- table-61-mode-consider-case-cipher-text--q15451479. [Accessed 21 11 2023].
Course Hero, "1 Consider the five block cipher modes of operation shown in Table 6.docx," 09 20 2019. [Online]. Available: https://www.coursehero.com/file/46728624/1Consider-the-five- block-cipher-modes-of-operation-shown-in-Table-6docx/. [Accessed 21 11 2023].
NIST, FIPS197, 2001.
NIST, SP-800-38A, 2001.
Xilinx, "Vivado Timing - Where can I find the Fmax in the timing report?" 2019.
Lightweight hardware architectures for fault diagnosis schemes of efficiently maskable cryptographic substitution boxes, 2016 IEEE International Conference on Electronics, Circuits and Systems, 2016. DOI: 10.1109/ICECS.2016.7841314.
CRC-oriented error detection architectures of post-quantum cryptography Niederreiter key generator on FPGA, 2022 IEEE Nordic Circuits and Systems Conference (NorCAS), 2022. DOI: 10.1109/NorCAS57515.2022.9934378.
Error Detection Schemes Assessed in FPGA for Multipliers in Lattice-Based Key Encapsulation Mechanisms in Post-quantum cryptography, IEEE Transactions on Emerging Topics in Computing, 2022. DOI: 10.1109/TETC.2022.3217.
DOI: https://doi.org/10.37537/rev.elektron.8.2.201.2024
Enlaces de Referencia
- Por el momento, no existen enlaces de referencia
Copyright (c) 2024 Hernan Paz Penagos, Arthur Stink Paipilla Arenas, Marco Andrés Ortiz Niño
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Revista elektron, ISSN-L 2525-0159
Facultad de Ingeniería. Universidad de Buenos Aires
Paseo Colón 850, 3er piso
C1063ACV - Buenos Aires - Argentina
revista.elektron@fi.uba.ar
+54 (11) 528-50889