Proceedings of the 4th International Workshop on Trustworthy Embedded Devices 2014
DOI: 10.1145/2666141.2666144
|View full text |Cite
|
Sign up to set email alerts
|

Simple AEAD Hardware Interface (SÆHI) in a SoC

Abstract: Simple AEAD Hardware Interface (SAEHI) is a hardware cryptographic interface aimed at CAESAR Authenticated Encryption with Associated Data (AEAD) algorithms. Cryptographic acceleration is typically achieved either with a coprocessor or via instruction set extensions. ISA modifications require re-engineering the CPU core, making the approach inapplicable outside the realm of open source processor cores. At minimum, we suggest implementing CAESAR AEADs as universal memory-mapped cryptographic coprocessors, synth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Theorem 2 Sponge modes with strong permutations such as DuplexWrap [4] or BLNK [39] are not vulnerable to adaptive-chosen-plaintext attacks.…”
Section: Theorem 1 Aes-gcm Is Not Vulnerable To Adaptive-chosenplaintmentioning
confidence: 99%
“…Theorem 2 Sponge modes with strong permutations such as DuplexWrap [4] or BLNK [39] are not vulnerable to adaptive-chosen-plaintext attacks.…”
Section: Theorem 1 Aes-gcm Is Not Vulnerable To Adaptive-chosenplaintmentioning
confidence: 99%
“…Authenticated encryption with associated data (AEAD) algorithms provide confidentiality and integrity protection in a single operation [4]. Deploying an AEAD algorithm on an IoT device and authenticating encryption before sending any data can protect the confidentiality and integrity of the data from the data-producer side and can ensure no information leakage or data-stealing during data transmission.…”
Section: Introductionmentioning
confidence: 99%
“…In comparison, the dedicated cryptography hardware has high performance, low power consumption, high efficiency, and fewer ROM/RAM resources. Moreover, the dedicated cryptography hardware extends the battery life of battery-powered IoT devices [4] and provides a higher level of security [8]. These advantages of dedicated hardware motivate us to develop dedicated hardware architectures for SM4-CCM that are suitable for resource-constrained IoT devices.…”
Section: Introductionmentioning
confidence: 99%