A Hardware Evaluation of a NIST Lightweight Cryptography Candidate
The continued expansion of the Internet of Things (IoT) in recent years has introduced a myriad of concerns about its security. There have been numerous examples of IoT devices being attacked, demonstrating the need for integrated security. The vulnerability of data transfers in the IoT can be addre...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Published: |
Virginia Tech
2020
|
Subjects: | |
Online Access: | http://hdl.handle.net/10919/98758 |
id |
ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-98758 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-987582020-09-26T05:38:19Z A Hardware Evaluation of a NIST Lightweight Cryptography Candidate Coleman, Flora Anne Electrical and Computer Engineering Diehl, William J. Tront, Joseph G. Nazhandali, Leyla Lightweight Cryptography Side Channel Analysis FPGA ARX The continued expansion of the Internet of Things (IoT) in recent years has introduced a myriad of concerns about its security. There have been numerous examples of IoT devices being attacked, demonstrating the need for integrated security. The vulnerability of data transfers in the IoT can be addressed using cryptographic protocols. However, IoT devices are resource-constrained which makes it difficult for them to support existing standards. To address the need for new, standardized lightweight cryptographic algorithms, the National Institute of Standards and Technology (NIST) began a Lightweight Cryptography Standardization Process. This work analyzes the Sparkle (Schwaemm and Esch) submission to the process from a hardware based perspective. Two baseline implementations are created, along with one implementation designed to be resistant to side channel analysis and an incremental implementation included for analysis purposes. The implementations use the Hardware API for Lightweight Cryptography to facilitate an impartial evaluation. The results indicate that the side channel resistant implementation resists leaking data while consuming approximately three times the area of the unprotected, incremental implementation and experiencing a 27% decrease in throughput. This work examines how all of these implementations perform, and additionally provides analysis of how they compare to other works of a similar nature. Master of Science In today's society, interactions with connected, data-sharing devices have become common. For example, devices like "smart" watches, remote access home security systems, and even connected vending machines have been adopted into many people's day to day routines. The Internet of Things (IoT) is the term used to describe networks of these interconnected devices. As the number of these connected devices continues to grow, there is an increased focus on the security of the IoT. Depending on the type of IoT application, a variety of different types of data can be transmitted. One way in which these data transfers can be protected is through the use of cryptographic protocols. The use of cryptography can provide assurances during data transfers. For example, it can prevent an attacker from reading the contents of a sensitive message. There are several well studied cryptographic protocols in use today. However, many of these protocols were intended for use in more traditional computing platforms. IoT devices are typically much smaller in size than traditional computing platforms. This makes it difficult for them to support these well studied protocols. Therefore, there have been efforts to investigate and standardize new lightweight cryptographic protocols which are well suited for smaller IoT devices. This work analyzes several hardware implementations of an algorithm which was proposed as a submission to the National Institute of Standards and Technology (NIST) Lightweight Cryptography Standardization Process. The analysis focuses on metrics which can be used to evaluate its suitability for IoT devices. 2020-06-05T08:02:10Z 2020-06-05T08:02:10Z 2020-06-04 Thesis vt_gsexam:25781 http://hdl.handle.net/10919/98758 In Copyright http://rightsstatements.org/vocab/InC/1.0/ ETD application/pdf Virginia Tech |
collection |
NDLTD |
format |
Others
|
sources |
NDLTD |
topic |
Lightweight Cryptography Side Channel Analysis FPGA ARX |
spellingShingle |
Lightweight Cryptography Side Channel Analysis FPGA ARX Coleman, Flora Anne A Hardware Evaluation of a NIST Lightweight Cryptography Candidate |
description |
The continued expansion of the Internet of Things (IoT) in recent years has introduced a
myriad of concerns about its security. There have been numerous examples of IoT devices
being attacked, demonstrating the need for integrated security. The vulnerability of data
transfers in the IoT can be addressed using cryptographic protocols. However, IoT devices
are resource-constrained which makes it difficult for them to support existing standards.
To address the need for new, standardized lightweight cryptographic algorithms, the National Institute of Standards and Technology (NIST) began a Lightweight Cryptography
Standardization Process. This work analyzes the Sparkle (Schwaemm and Esch) submission to the process from a hardware based perspective. Two baseline implementations are
created, along with one implementation designed to be resistant to side channel analysis
and an incremental implementation included for analysis purposes. The implementations
use the Hardware API for Lightweight Cryptography to facilitate an impartial evaluation.
The results indicate that the side channel resistant implementation resists leaking data while
consuming approximately three times the area of the unprotected, incremental implementation and experiencing a 27% decrease in throughput. This work examines how all of these
implementations perform, and additionally provides analysis of how they compare to other
works of a similar nature. === Master of Science === In today's society, interactions with connected, data-sharing devices have become common.
For example, devices like "smart" watches, remote access home security systems, and even
connected vending machines have been adopted into many people's day to day routines.
The Internet of Things (IoT) is the term used to describe networks of these interconnected
devices. As the number of these connected devices continues to grow, there is an increased
focus on the security of the IoT. Depending on the type of IoT application, a variety of
different types of data can be transmitted. One way in which these data transfers can be
protected is through the use of cryptographic protocols. The use of cryptography can provide
assurances during data transfers. For example, it can prevent an attacker from reading the
contents of a sensitive message. There are several well studied cryptographic protocols in
use today. However, many of these protocols were intended for use in more traditional computing platforms. IoT devices are typically much smaller in size than traditional computing
platforms. This makes it difficult for them to support these well studied protocols. Therefore, there have been efforts to investigate and standardize new lightweight cryptographic
protocols which are well suited for smaller IoT devices. This work analyzes several hardware implementations of an algorithm which was proposed as a submission to the National
Institute of Standards and Technology (NIST) Lightweight Cryptography Standardization
Process. The analysis focuses on metrics which can be used to evaluate its suitability for
IoT devices. |
author2 |
Electrical and Computer Engineering |
author_facet |
Electrical and Computer Engineering Coleman, Flora Anne |
author |
Coleman, Flora Anne |
author_sort |
Coleman, Flora Anne |
title |
A Hardware Evaluation of a NIST Lightweight Cryptography Candidate |
title_short |
A Hardware Evaluation of a NIST Lightweight Cryptography Candidate |
title_full |
A Hardware Evaluation of a NIST Lightweight Cryptography Candidate |
title_fullStr |
A Hardware Evaluation of a NIST Lightweight Cryptography Candidate |
title_full_unstemmed |
A Hardware Evaluation of a NIST Lightweight Cryptography Candidate |
title_sort |
hardware evaluation of a nist lightweight cryptography candidate |
publisher |
Virginia Tech |
publishDate |
2020 |
url |
http://hdl.handle.net/10919/98758 |
work_keys_str_mv |
AT colemanfloraanne ahardwareevaluationofanistlightweightcryptographycandidate AT colemanfloraanne hardwareevaluationofanistlightweightcryptographycandidate |
_version_ |
1719342903828938752 |