Cryptology ePrint Archive: Report 2018/573

Improved Lightweight Implementations of CAESAR Authenticated Ciphers

Farnoud Farahmand and William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj

Abstract: Authenticated ciphers offer potential benefits to resource-constrained devices in the Internet of Things (IoT). The CAESAR competition seeks optimal authenticated ciphers based on several criteria, including performance in resource-constrained (i.e., low-area, low-power, and low-energy) hardware. Although the competition specified a ”lightweight” use case for Round 3, most hardware submissions to Round 3 were not lightweight implementations, in that they employed architectures optimized for best throughput-to-area (TP/A) ratio, and used the Pre- and PostProcessor modules from the CAE-SAR Hardware (HW) Development Package designed for high-speed applications. In this research, we provide true lightweight implementations of selected ciphers (ACORN, NORX, CLOC-AES, SILC-AES, and SILC-LED). These implementations use an improved version of the CAESAR HW DevelopmentPackage designed for lightweight applications, and are fully compliant with the CAESAR HW Application programming interface for Authenticated Ciphers. Our lightweight implementations achieve an average of 55% reduction in area and40% reduction in power compared to their corresponding high-speed versions. Although the average energy per bit of lightweight ciphers increases by a factor of 3.6, the lightweight version of NORX actually uses 47% less energy per bit than its corresponding high-speed implementation.

Category / Keywords: Reconfigurable, FPGA, Lightweight, Power, Energy, Authenticated Cipher, CAESAR, FOBOS

Original Publication (with minor differences): Proceedings of the 26th IEEE International Symposium on Field-Programmable Custom ComputingMachines (FCCM), 2018

Date: received 31 May 2018, last revised 5 Jun 2018

Contact author: ffarahma at gmu edu

Available format(s): PDF | BibTeX Citation

Version: 20180605:174842 (All versions of this report)

Short URL: ia.cr/2018/573


[ Cryptology ePrint archive ]