Skip to main content
Top

2019 | OriginalPaper | Chapter

Efficient FPGA Implementation of an Integrated Bilateral Key Confirmation Scheme for Pair-Wise Key-Establishment and Authenticated Encryption

Authors : Abiy Tadesse Abebe, Yalemzewd Negash Shiferaw, Workineh Gebeye Abera, P. G. V. Suresh Kumar

Published in: Advances of Science and Technology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The purpose of this paper is to propose a bilateral key confirmation scheme which provides a trustworthy key establishment between two communicating parties. There are various cryptographic schemes proposed based on unilateral key confirmation. But, such schemes do not confirm the equality of the common secret information computed independently by each communicating party, and do not consider whether the other end is the intended owner of the shared secret. However, exchanging of the secret information blindly without verifying that both of the ends have computed the same common secret information and without ensuring the identity of the other end with whom they are communicating, can create security risks since attackers can impersonate acting as a claimed sender or recipient. The proposed work provides bilateral key confirmation for pair-wise key-establishment based on FPGA by integrating a key agreement protocol and an authenticated encryption scheme. The implementation outcomes show the proposed scheme’s reasonable hardware complexity and enhanced performance compared to existing similar works.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. ACM Trans. Commun 21, 120–126 (1978)MathSciNetCrossRef Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. ACM Trans. Commun 21, 120–126 (1978)MathSciNetCrossRef
4.
go back to reference Gutub, A.A., Khan, F.A.: Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. In: IEEE International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 116–121 (2013) Gutub, A.A., Khan, F.A.: Hybrid crypto hardware utilizing symmetric-key & public-key cryptosystems. In: IEEE International Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 116–121 (2013)
5.
go back to reference Nadjia, A., Mohamed, A.: AES IP for hybrid cryptosystem RSA-AES. In: IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD 2015), pp. 1–6 (2015) Nadjia, A., Mohamed, A.: AES IP for hybrid cryptosystem RSA-AES. In: IEEE 12th International Multi-Conference on Systems, Signals & Devices (SSD 2015), pp. 1–6 (2015)
6.
go back to reference Kapur, R.K., Khatri, S.K.: Secure data transfer in MANET using symmetric and asymmetric cryptography. In: IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), pp. 1–5 (2015) Kapur, R.K., Khatri, S.K.: Secure data transfer in MANET using symmetric and asymmetric cryptography. In: IEEE International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), pp. 1–5 (2015)
8.
go back to reference Martínez, V.G., Alvarez, F.H., Encinas, L.H., Ávila, C.S..: A comparison of the standardized versions of ECIES. In: IEEE Sixth International Conference on Information Assurance and Security (2010) Martínez, V.G., Alvarez, F.H., Encinas, L.H., Ávila, C.S..: A comparison of the standardized versions of ECIES. In: IEEE Sixth International Conference on Information Assurance and Security (2010)
9.
go back to reference Martínez, V.G., Álvarez, F.H., Encinas, L. H.: Analysis of ECIES and other cryptosystems based on elliptic curves. CSIC Digital (2013) Martínez, V.G., Álvarez, F.H., Encinas, L. H.: Analysis of ECIES and other cryptosystems based on elliptic curves. CSIC Digital (2013)
10.
go back to reference Barker, E., Chen, L., Roginsky, A., Vassilev, A., Davis, R.: Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography. NIST Special Publication 800-56A Revision 3, April 2018 Barker, E., Chen, L., Roginsky, A., Vassilev, A., Davis, R.: Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography. NIST Special Publication 800-56A Revision 3, April 2018
11.
go back to reference Dworkin, M.: NIST Special Publication 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC (2007) Dworkin, M.: NIST Special Publication 800-38D: Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC (2007)
12.
go back to reference Federal Information Processing Standards (FIPS) Publication 180-4,: Secure Hash Standard (SHS), vol. 4 (2015) Federal Information Processing Standards (FIPS) Publication 180-4,: Secure Hash Standard (SHS), vol. 4 (2015)
14.
go back to reference Wang, J., Shou, G., Hu, Y., Guo, Z.: High-speed architectures for GHASH based on efficient bit-parallel multipliers. In: IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), pp. 582–586 (2010) Wang, J., Shou, G., Hu, Y., Guo, Z.: High-speed architectures for GHASH based on efficient bit-parallel multipliers. In: IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS), pp. 582–586 (2010)
15.
go back to reference Mastrovito, E.D.: VLSI architectures for computations in Galois fields. Ph.D. thesis, Linköping University, Department of Electrical Engineering, Linköping, Sweden (1991) Mastrovito, E.D.: VLSI architectures for computations in Galois fields. Ph.D. thesis, Linköping University, Department of Electrical Engineering, Linköping, Sweden (1991)
18.
go back to reference Abdellatif, K.M., Chotin-Avot, R., Mehrez, H.: Authenticated encryption on FPGAs from the static part to the reconfigurable part. Microprocess. Microsyst. 38(6), 526–538 (2014)CrossRef Abdellatif, K.M., Chotin-Avot, R., Mehrez, H.: Authenticated encryption on FPGAs from the static part to the reconfigurable part. Microprocess. Microsyst. 38(6), 526–538 (2014)CrossRef
19.
go back to reference Abdellatif, K.M., Chotin-Avot, R., Mehrez, H.: AES-GCM and AEGIS: efficient and high speed hardware ımplementations. J. Signal Process. Syst. 88(1), 1–12 (2017)CrossRef Abdellatif, K.M., Chotin-Avot, R., Mehrez, H.: AES-GCM and AEGIS: efficient and high speed hardware ımplementations. J. Signal Process. Syst. 88(1), 1–12 (2017)CrossRef
20.
go back to reference Sandoval, M.M., Uribe, C.F.: A hardware architecture for elliptic curve cryptography and lossless data compression. In: IEEE International Conference on Electronics, Communications and Computers, pp. 113–118 (2005) Sandoval, M.M., Uribe, C.F.: A hardware architecture for elliptic curve cryptography and lossless data compression. In: IEEE International Conference on Electronics, Communications and Computers, pp. 113–118 (2005)
Metadata
Title
Efficient FPGA Implementation of an Integrated Bilateral Key Confirmation Scheme for Pair-Wise Key-Establishment and Authenticated Encryption
Authors
Abiy Tadesse Abebe
Yalemzewd Negash Shiferaw
Workineh Gebeye Abera
P. G. V. Suresh Kumar
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-15357-1_36

Premium Partner