Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems

被引:0
|
作者
Hori, Yohei [1 ]
Satoh, Akashi [1 ]
Sakane, Hirofumi [1 ]
Toda, Kenji [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tsukuba, Ibaraki 3058568, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure and dependable dynamic partial reconfiguration (DPR) system based on the AES-GCM cipher is developed, where the reconfigurable IP cores are protected by encrypting and authenticating their bitstreams with AES-GCM. In DPR systems, bitstream authentication is essential for avoiding fatal damage caused by inadvertent bitstreams. Although encryption-only systems can prevent bitstream cloning and reverse engineering, they cannot prevent erroneous or malicious bitstreams from being accepted as valid. If a bitstream error is detected after the system has already been partly configured, the system must be reconfigured with an errorless bitstream or at worst rebooted since the DPR changes the hardware architecture itself and the system cannot recover itself to the initial state by asserting a reset signal. In this regard, our system can recover from configuration errors without rebooting. To the authors' best knowledge, this is the first DPR system featuring both bitstream protection and error recovery mechanisms. Additionally, we clarify the relationship between the computation time and the bitstream block size, and derive the optimal internal memory size necessary to achieve the highest throughput. Furthermore, we implemented an AES-GCM-based DPR system targeting the Virtex-5 device on an off-the-shelf board, and demonstrated that all functions of bitstream decryption, verification, configuration, and error recovery work correctly. This paper clarifies the throughput, the hardware utilization, and the optimal memory configuration of said DPR system.
引用
收藏
页码:261 / 278
页数:18
相关论文
共 36 条
  • [1] BITSTREAM ENCRYPTION AND AUTHENTICATION WITH AES-GCM IN DYNAMICALLY RECONFIGURABLE SYSTEMS
    Hori, Yohei
    Satoh, Akashi
    Sakane, Hirofumi
    Toda, Kenji
    2008 INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE AND LOGIC APPLICATIONS, VOLS 1 AND 2, 2008, : 23 - 28
  • [2] The fragility of AES-GCM authentication algorithm
    Gueron, Shay
    Krasnov, Vlad
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 333 - 337
  • [3] Poster: Efficient AES-GCM Decryption Under Homomorphic Encryption
    Aharoni, Ehud
    Drucker, Nir
    Ezov, Gilad
    Kushnir, Eyal
    Shaul, Hayim
    Soceanu, Omri
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3567 - 3569
  • [4] Performance Comparison of AES-GCM-SIV and AES-GCM Algorithms for Authenticated Encryption on FPGA Platforms
    Koteshwara, Sandhya
    Das, Amitabh
    Parhi, Keshab K.
    2017 FIFTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2017, : 1331 - 1336
  • [5] An AES-GCM Authenticated Encryption Crypto-Core for IoT Security
    Sung, Byung-Yoon
    Kim, Ki-Bbeum
    Shin, Kyung-Wook
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 285 - 287
  • [6] Dynamically Reconfigurable Encryption System of the AES
    WANG Youren
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1569 - 1572
  • [7] Astudy of Authentication Encryption Algorithms (POET, Deoxys, AEZ, MORUS, ACO, AEGIS, AES-GCM) For Automotive Security
    Sharaf, Sahar
    Mostafa, Hassan
    2018 30TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2018, : 303 - 306
  • [8] Off-Chip Memory Encryption and Integrity Protection Based on AES-GCM in Embedded Systems
    Liu, Zhenglin
    Zhu, Qingchun
    Li, Dongfang
    Zou, Xuecheng
    IEEE DESIGN & TEST, 2013, 30 (05) : 54 - 62
  • [9] Efficient AES-GCM for VPNs Using FPGAs
    Abdellatif, Karim M.
    Chotin-Avot, R.
    Mehrez, H.
    2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, : 1411 - 1414
  • [10] FPGA implementation and comparison of AES-GCM and Deoxys Authenticated Encryption schemes
    Koteshwara, Sandhya
    Das, Amitabh
    Parhi, Keshab K.
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, : 356 - 359