Masked Implementation of Format Preserving Encryption on Low-End AVR Microcontrollers and High-End ARM Processors

نویسندگان

چکیده

Format-Preserving Encryption (FPE) for Internet of Things (IoT) enables the data encryption while preserving format and length original data. With these advantages, FPE can be utilized in many IoT applications. However, requires complicated computations are high overheads on embedded devices. In this paper, we proposed an efficient implementation Format-preserving Algorithm (FEA), which is Korean standard FPE, first-order masked FEA both low-end (i.e., AVR microcontroller) high-end ARM processor) Firstly, show vulnerability when it comes to Correlation Power Analysis (CPA) approach. Afterward, propose method masking technique device device. The secure against power analysis attacks but performance degradation measure only 2.53∼3.77% than naïve implementation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

End-to-End Verification of ARM Processors with ISA-Formal

Despite 20+ years of research on processor verification, it remains hard to use formal verification techniques in commercial processor development. There are two significant factors: scaling issues and return on investment. The scaling issues include the size of modern processor specifications, the size/complexity of processor designs, the size of design/verification teams and the (non)availabi...

متن کامل

Preserving Timing Anomalies in Pipelines of High-End Processors

Many embedded systems are subject to temporal constraints that require advance guarantees on meeting deadlines. Such systems rely on static analysis to safely bound worst-case execution (WCET) bounds of tasks. Designers of these systems are forced to avoid state-of-the-art processors due to their inherent architectural complexity that results in non-determinism. Such micro-processors are typica...

متن کامل

Format Preserving Encryption

Encrypting Personally Identifiable Information (PII) in large databases has historically been difficult, because encrypting information typically implies expanding data and changing its format. Previous attempts to encrypt PII data like credit card numbers and Social Security Numbers without changing their format have used questionable cryptographic constructions. We examine the security model ...

متن کامل

Format-Preserving Encryption

Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a valid creditcard number. The problem has been known for some time, but it has lacked a fully general and rigorous treatment. We provide one, starting off by formally defining FPE and security goals for it. We investigate...

متن کامل

Efficient Ring-LWE Encryption on 8-Bit AVR Processors

Public-key cryptography based on the “ring-variant” of the Learning with Errors (ring-LWE) problem is both efficient and believed to remain secure in a post-quantum world. In this paper, we introduce a carefully-optimized implementation of a ring-LWE encryption scheme for 8-bit AVR processors like the ATxmega128. Our research contributions include several optimizations for the Number Theoretic ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Mathematics

سال: 2021

ISSN: ['2227-7390']

DOI: https://doi.org/10.3390/math9111294