Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems

被引:0
|
作者
Hori, Yohei [1 ]
Satoh, Akashi [1 ]
Sakane, Hirofumi [1 ]
Toda, Kenji [1 ]
机构
[1] Natl Inst Adv Ind Sci & Technol, Tsukuba, Ibaraki 3058568, Japan
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A secure and dependable dynamic partial reconfiguration (DPR) system based on the AES-GCM cipher is developed, where the reconfigurable IP cores are protected by encrypting and authenticating their bitstreams with AES-GCM. In DPR systems, bitstream authentication is essential for avoiding fatal damage caused by inadvertent bitstreams. Although encryption-only systems can prevent bitstream cloning and reverse engineering, they cannot prevent erroneous or malicious bitstreams from being accepted as valid. If a bitstream error is detected after the system has already been partly configured, the system must be reconfigured with an errorless bitstream or at worst rebooted since the DPR changes the hardware architecture itself and the system cannot recover itself to the initial state by asserting a reset signal. In this regard, our system can recover from configuration errors without rebooting. To the authors' best knowledge, this is the first DPR system featuring both bitstream protection and error recovery mechanisms. Additionally, we clarify the relationship between the computation time and the bitstream block size, and derive the optimal internal memory size necessary to achieve the highest throughput. Furthermore, we implemented an AES-GCM-based DPR system targeting the Virtex-5 device on an off-the-shelf board, and demonstrated that all functions of bitstream decryption, verification, configuration, and error recovery work correctly. This paper clarifies the throughput, the hardware utilization, and the optimal memory configuration of said DPR system.
引用
收藏
页码:261 / 278
页数:18
相关论文
共 36 条
  • [21] 100 Gbit/s AES-GCM Cryptography Engine for Optical Transport Network Systems: Architecture, Design and 40 nm Silicon Prototyping
    Mobilon, Eduardo
    Arantes, Dalton Soares
    MICROELECTRONICS JOURNAL, 2021, 116
  • [22] Implementing Encryption and Authentication in KNX using Diffie-Hellman and AES Algorithms
    Cavalieri, Salvatore
    Cutuli, Giovanni
    IECON: 2009 35TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS, VOLS 1-6, 2009, : 2317 - +
  • [23] Strong authentication for RFID systems using the AES algorithm
    Feldhofer, M
    Dominikus, S
    Wolkerstorfer, J
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 357 - 370
  • [24] Embedded Systems Authentication and Encryption Using Strong PUF Modeling
    Quadir, Md Shahed Enamul
    Chandy, John A.
    2020 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2020, : 437 - 442
  • [25] An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems
    Toiruul, Batbold
    Lee, KyungOh
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (9B): : 156 - 162
  • [26] Privacy-preserving biometrics authentication systems using fully homomorphic encryption
    Torres, Wilson Abel Alberto
    Bhattacharjee, Nandita
    Srinivasan, Bala
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2015, 11 (02) : 151 - 168
  • [27] Scheduling of periodic tasks on a dynamically reconfigurable device using timed discrete event systems
    Ushio, Toshimitsu
    Onogi, Kenji
    WODES 2006: EIGHTH INTERNATIONAL WORKSHOP ON DISCRETE EVENT SYSTEMS, PROCEEDINGS, 2006, : 82 - +
  • [28] Scheduling of periodic tasks on a dynamically reconfigurable device using timed discrete event systems
    Onogi, Kenji
    Ushio, Toshimitsu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (11) : 3227 - 3234
  • [29] Breaking Down the Barriers of Using Strong Authentication and Encryption in Resource Constrained Embedded Systems
    Knobler, Ron
    Scheffel, Peter
    Jackson, Scott
    Gaj, Kris
    Kaps, Jens Peter
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2013, 2013, 8755
  • [30] Advanced Real Time RFID Mutual Authentication Protocol Using Dynamically Updated Secret Value Through Encryption And Decryption Process
    Risalat, Nure Alam Md.
    Hasan, Md. Tanvir
    Hossain, Md. Shahadat
    Rahman, Md. Mahbubur
    2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION ENGINEERING (ECCE), 2017, : 788 - 793