Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things

As the technology of Internet of Things (IoT) evolves, abundant data is generated from sensor nodes and exchanged between them. For this reason, efficient encryption is required to keep data in secret. Since low-end IoT devices have limited computation power, it is difficult to operate expensive cip...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2020-09, Vol.9 (9), p.1548
Hauptverfasser: Kwon, Hyeokdong, An, SangWoo, Kim, YoungBeom, Kim, Hyunji, Choi, Seung Ju, Jang, Kyoungbae, Park, Jaehoon, Kim, Hyunjun, Seo, Seog Chung, Seo, Hwajeong
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 9
container_start_page 1548
container_title Electronics (Basel)
container_volume 9
creator Kwon, Hyeokdong
An, SangWoo
Kim, YoungBeom
Kim, Hyunji
Choi, Seung Ju
Jang, Kyoungbae
Park, Jaehoon
Kim, Hyunjun
Seo, Seog Chung
Seo, Hwajeong
description As the technology of Internet of Things (IoT) evolves, abundant data is generated from sensor nodes and exchanged between them. For this reason, efficient encryption is required to keep data in secret. Since low-end IoT devices have limited computation power, it is difficult to operate expensive ciphers on them. Lightweight block ciphers reduce computation overheads, which are suitable for low-end IoT platforms. In this paper, we implemented the optimized CHAM block cipher in the counter mode of operation, on 8-bit AVR microcontrollers (i.e., representative sensor nodes). There are four new techniques applied. First, the execution time is drastically reduced, by skipping eight rounds through pre-calculation and look-up table access. Second, the encryption with a variable-key scenario is optimized with the on-the-fly table calculation. Third, the encryption in a parallel way makes multiple blocks computed in online for CHAM-64/128 case. Fourth, the state-of-art engineering technique is fully utilized in terms of the instruction level and register level. With these optimization methods, proposed optimized CHAM implementations for counter mode of operation outperformed the state-of-art implementations by 12.8%, 8.9%, and 9.6% for CHAM-64/128, CHAM-128/128, and CHAM-128/256, respectively.
doi_str_mv 10.3390/electronics9091548
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2599075129</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2599075129</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-aa7e0daeb2e8faf4ccae3a9e3cf7d908e6f7e753d5aec9550838deff007e0ded3</originalsourceid><addsrcrecordid>eNplUD1PwzAQtRBIVKV_gMkSc-Bi1yQ3llBopVQwlDkyzrlNCXawUyH-fVOVAYlb3g3vS4-x6xRupUS4o5ZMH7xrTETAVE3zMzYSkGGCAsX5n_-STWLcwXCYylzCiL0-Umw2rnEbrnmxmK34Q-vNBy-abkuBe8dL_53MXc1XjQneeDcktS2FyK0PfOl6Co567i1fbweXeMUurG4jTX5xzN6e5utikZQvz8tiViZGptgnWmcEtaZ3QbnVdmqMJqmRpLFZjZDTvc0oU7JWmgwqBbnMa7IW4KijWo7Zzcm3C_5rT7Gvdn4f3BBZCYUImUoFDixxYg3dYwxkqy40nzr8VClUx_Gq_-PJA2e0ZnA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2599075129</pqid></control><display><type>article</type><title>Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>MDPI - Multidisciplinary Digital Publishing Institute</source><creator>Kwon, Hyeokdong ; An, SangWoo ; Kim, YoungBeom ; Kim, Hyunji ; Choi, Seung Ju ; Jang, Kyoungbae ; Park, Jaehoon ; Kim, Hyunjun ; Seo, Seog Chung ; Seo, Hwajeong</creator><creatorcontrib>Kwon, Hyeokdong ; An, SangWoo ; Kim, YoungBeom ; Kim, Hyunji ; Choi, Seung Ju ; Jang, Kyoungbae ; Park, Jaehoon ; Kim, Hyunjun ; Seo, Seog Chung ; Seo, Hwajeong</creatorcontrib><description>As the technology of Internet of Things (IoT) evolves, abundant data is generated from sensor nodes and exchanged between them. For this reason, efficient encryption is required to keep data in secret. Since low-end IoT devices have limited computation power, it is difficult to operate expensive ciphers on them. Lightweight block ciphers reduce computation overheads, which are suitable for low-end IoT platforms. In this paper, we implemented the optimized CHAM block cipher in the counter mode of operation, on 8-bit AVR microcontrollers (i.e., representative sensor nodes). There are four new techniques applied. First, the execution time is drastically reduced, by skipping eight rounds through pre-calculation and look-up table access. Second, the encryption with a variable-key scenario is optimized with the on-the-fly table calculation. Third, the encryption in a parallel way makes multiple blocks computed in online for CHAM-64/128 case. Fourth, the state-of-art engineering technique is fully utilized in terms of the instruction level and register level. With these optimization methods, proposed optimized CHAM implementations for counter mode of operation outperformed the state-of-art implementations by 12.8%, 8.9%, and 9.6% for CHAM-64/128, CHAM-128/128, and CHAM-128/256, respectively.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics9091548</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Algorithms ; Computation ; Cryptography ; Encryption ; Internet of Things ; Lookup tables ; Mathematical analysis ; Microcontrollers ; Nodes ; Optimization ; Optimization techniques</subject><ispartof>Electronics (Basel), 2020-09, Vol.9 (9), p.1548</ispartof><rights>2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-aa7e0daeb2e8faf4ccae3a9e3cf7d908e6f7e753d5aec9550838deff007e0ded3</citedby><cites>FETCH-LOGICAL-c319t-aa7e0daeb2e8faf4ccae3a9e3cf7d908e6f7e753d5aec9550838deff007e0ded3</cites><orcidid>0000-0001-8016-2808 ; 0000-0003-0069-9061 ; 0000-0003-4715-8393</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,778,782,27911,27912</link.rule.ids></links><search><creatorcontrib>Kwon, Hyeokdong</creatorcontrib><creatorcontrib>An, SangWoo</creatorcontrib><creatorcontrib>Kim, YoungBeom</creatorcontrib><creatorcontrib>Kim, Hyunji</creatorcontrib><creatorcontrib>Choi, Seung Ju</creatorcontrib><creatorcontrib>Jang, Kyoungbae</creatorcontrib><creatorcontrib>Park, Jaehoon</creatorcontrib><creatorcontrib>Kim, Hyunjun</creatorcontrib><creatorcontrib>Seo, Seog Chung</creatorcontrib><creatorcontrib>Seo, Hwajeong</creatorcontrib><title>Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things</title><title>Electronics (Basel)</title><description>As the technology of Internet of Things (IoT) evolves, abundant data is generated from sensor nodes and exchanged between them. For this reason, efficient encryption is required to keep data in secret. Since low-end IoT devices have limited computation power, it is difficult to operate expensive ciphers on them. Lightweight block ciphers reduce computation overheads, which are suitable for low-end IoT platforms. In this paper, we implemented the optimized CHAM block cipher in the counter mode of operation, on 8-bit AVR microcontrollers (i.e., representative sensor nodes). There are four new techniques applied. First, the execution time is drastically reduced, by skipping eight rounds through pre-calculation and look-up table access. Second, the encryption with a variable-key scenario is optimized with the on-the-fly table calculation. Third, the encryption in a parallel way makes multiple blocks computed in online for CHAM-64/128 case. Fourth, the state-of-art engineering technique is fully utilized in terms of the instruction level and register level. With these optimization methods, proposed optimized CHAM implementations for counter mode of operation outperformed the state-of-art implementations by 12.8%, 8.9%, and 9.6% for CHAM-64/128, CHAM-128/128, and CHAM-128/256, respectively.</description><subject>Algorithms</subject><subject>Computation</subject><subject>Cryptography</subject><subject>Encryption</subject><subject>Internet of Things</subject><subject>Lookup tables</subject><subject>Mathematical analysis</subject><subject>Microcontrollers</subject><subject>Nodes</subject><subject>Optimization</subject><subject>Optimization techniques</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNplUD1PwzAQtRBIVKV_gMkSc-Bi1yQ3llBopVQwlDkyzrlNCXawUyH-fVOVAYlb3g3vS4-x6xRupUS4o5ZMH7xrTETAVE3zMzYSkGGCAsX5n_-STWLcwXCYylzCiL0-Umw2rnEbrnmxmK34Q-vNBy-abkuBe8dL_53MXc1XjQneeDcktS2FyK0PfOl6Co567i1fbweXeMUurG4jTX5xzN6e5utikZQvz8tiViZGptgnWmcEtaZ3QbnVdmqMJqmRpLFZjZDTvc0oU7JWmgwqBbnMa7IW4KijWo7Zzcm3C_5rT7Gvdn4f3BBZCYUImUoFDixxYg3dYwxkqy40nzr8VClUx_Gq_-PJA2e0ZnA</recordid><startdate>20200901</startdate><enddate>20200901</enddate><creator>Kwon, Hyeokdong</creator><creator>An, SangWoo</creator><creator>Kim, YoungBeom</creator><creator>Kim, Hyunji</creator><creator>Choi, Seung Ju</creator><creator>Jang, Kyoungbae</creator><creator>Park, Jaehoon</creator><creator>Kim, Hyunjun</creator><creator>Seo, Seog Chung</creator><creator>Seo, Hwajeong</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-8016-2808</orcidid><orcidid>https://orcid.org/0000-0003-0069-9061</orcidid><orcidid>https://orcid.org/0000-0003-4715-8393</orcidid></search><sort><creationdate>20200901</creationdate><title>Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things</title><author>Kwon, Hyeokdong ; An, SangWoo ; Kim, YoungBeom ; Kim, Hyunji ; Choi, Seung Ju ; Jang, Kyoungbae ; Park, Jaehoon ; Kim, Hyunjun ; Seo, Seog Chung ; Seo, Hwajeong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-aa7e0daeb2e8faf4ccae3a9e3cf7d908e6f7e753d5aec9550838deff007e0ded3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Algorithms</topic><topic>Computation</topic><topic>Cryptography</topic><topic>Encryption</topic><topic>Internet of Things</topic><topic>Lookup tables</topic><topic>Mathematical analysis</topic><topic>Microcontrollers</topic><topic>Nodes</topic><topic>Optimization</topic><topic>Optimization techniques</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Kwon, Hyeokdong</creatorcontrib><creatorcontrib>An, SangWoo</creatorcontrib><creatorcontrib>Kim, YoungBeom</creatorcontrib><creatorcontrib>Kim, Hyunji</creatorcontrib><creatorcontrib>Choi, Seung Ju</creatorcontrib><creatorcontrib>Jang, Kyoungbae</creatorcontrib><creatorcontrib>Park, Jaehoon</creatorcontrib><creatorcontrib>Kim, Hyunjun</creatorcontrib><creatorcontrib>Seo, Seog Chung</creatorcontrib><creatorcontrib>Seo, Hwajeong</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Kwon, Hyeokdong</au><au>An, SangWoo</au><au>Kim, YoungBeom</au><au>Kim, Hyunji</au><au>Choi, Seung Ju</au><au>Jang, Kyoungbae</au><au>Park, Jaehoon</au><au>Kim, Hyunjun</au><au>Seo, Seog Chung</au><au>Seo, Hwajeong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things</atitle><jtitle>Electronics (Basel)</jtitle><date>2020-09-01</date><risdate>2020</risdate><volume>9</volume><issue>9</issue><spage>1548</spage><pages>1548-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>As the technology of Internet of Things (IoT) evolves, abundant data is generated from sensor nodes and exchanged between them. For this reason, efficient encryption is required to keep data in secret. Since low-end IoT devices have limited computation power, it is difficult to operate expensive ciphers on them. Lightweight block ciphers reduce computation overheads, which are suitable for low-end IoT platforms. In this paper, we implemented the optimized CHAM block cipher in the counter mode of operation, on 8-bit AVR microcontrollers (i.e., representative sensor nodes). There are four new techniques applied. First, the execution time is drastically reduced, by skipping eight rounds through pre-calculation and look-up table access. Second, the encryption with a variable-key scenario is optimized with the on-the-fly table calculation. Third, the encryption in a parallel way makes multiple blocks computed in online for CHAM-64/128 case. Fourth, the state-of-art engineering technique is fully utilized in terms of the instruction level and register level. With these optimization methods, proposed optimized CHAM implementations for counter mode of operation outperformed the state-of-art implementations by 12.8%, 8.9%, and 9.6% for CHAM-64/128, CHAM-128/128, and CHAM-128/256, respectively.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics9091548</doi><orcidid>https://orcid.org/0000-0001-8016-2808</orcidid><orcidid>https://orcid.org/0000-0003-0069-9061</orcidid><orcidid>https://orcid.org/0000-0003-4715-8393</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2020-09, Vol.9 (9), p.1548
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2599075129
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; MDPI - Multidisciplinary Digital Publishing Institute
subjects Algorithms
Computation
Cryptography
Encryption
Internet of Things
Lookup tables
Mathematical analysis
Microcontrollers
Nodes
Optimization
Optimization techniques
title Designing a CHAM Block Cipher on Low-End Microcontrollers for Internet of Things
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T15%3A39%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Designing%20a%20CHAM%20Block%20Cipher%20on%20Low-End%20Microcontrollers%20for%20Internet%20of%20Things&rft.jtitle=Electronics%20(Basel)&rft.au=Kwon,%20Hyeokdong&rft.date=2020-09-01&rft.volume=9&rft.issue=9&rft.spage=1548&rft.pages=1548-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics9091548&rft_dat=%3Cproquest_cross%3E2599075129%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2599075129&rft_id=info:pmid/&rfr_iscdi=true