{"title":"基于CRC和KECCAK的资源受限设备消息认证比较","authors":"Yang Yu, S. Tao, E. Dubrova","doi":"10.1109/NEWCAS.2018.8585692","DOIUrl":null,"url":null,"abstract":"With the growth of Internet-of-Things (IoT), billions of low-end devices become connected to provide new services appealing to users. The value of the information to which these devices have access via network is increasing, too, making them an attractive target for cyberattacks. Low-end IoT devices typically have very limited computing, storage and energy resources. Therefore, it is not always possible to use conventional cryptographic algorithms for their protection. In this paper, we investigate whether a cryptographically secure Cyclic Redundancy Check (CRC)-based Message Authentication Code (CMAC) and a KECCAK-based Message Authentication Code (KMAC) satisfy limitations of resource-constrained IoT devices. We implement the 128-bits CMAC and the 128-bits KMAC in 65nm CMOS and compare their performance. To our best knowledge, no hardware implementations of CMAC and KMAC have been presented so far. Our evaluation shows that, for 1.2V operating voltage and clock frequencies above 1 MHz, the CMAC128 is at least 32 times more area-efficient and at least 21 times more power-efficient than the KMAC128.","PeriodicalId":112526,"journal":{"name":"2018 16th IEEE International New Circuits and Systems Conference (NEWCAS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Comparison of CRC and KECCAK Based Message Authentication for Resource-Constrained Devices\",\"authors\":\"Yang Yu, S. Tao, E. Dubrova\",\"doi\":\"10.1109/NEWCAS.2018.8585692\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growth of Internet-of-Things (IoT), billions of low-end devices become connected to provide new services appealing to users. The value of the information to which these devices have access via network is increasing, too, making them an attractive target for cyberattacks. Low-end IoT devices typically have very limited computing, storage and energy resources. Therefore, it is not always possible to use conventional cryptographic algorithms for their protection. In this paper, we investigate whether a cryptographically secure Cyclic Redundancy Check (CRC)-based Message Authentication Code (CMAC) and a KECCAK-based Message Authentication Code (KMAC) satisfy limitations of resource-constrained IoT devices. We implement the 128-bits CMAC and the 128-bits KMAC in 65nm CMOS and compare their performance. To our best knowledge, no hardware implementations of CMAC and KMAC have been presented so far. Our evaluation shows that, for 1.2V operating voltage and clock frequencies above 1 MHz, the CMAC128 is at least 32 times more area-efficient and at least 21 times more power-efficient than the KMAC128.\",\"PeriodicalId\":112526,\"journal\":{\"name\":\"2018 16th IEEE International New Circuits and Systems Conference (NEWCAS)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 16th IEEE International New Circuits and Systems Conference (NEWCAS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NEWCAS.2018.8585692\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 16th IEEE International New Circuits and Systems Conference (NEWCAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NEWCAS.2018.8585692","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Comparison of CRC and KECCAK Based Message Authentication for Resource-Constrained Devices
With the growth of Internet-of-Things (IoT), billions of low-end devices become connected to provide new services appealing to users. The value of the information to which these devices have access via network is increasing, too, making them an attractive target for cyberattacks. Low-end IoT devices typically have very limited computing, storage and energy resources. Therefore, it is not always possible to use conventional cryptographic algorithms for their protection. In this paper, we investigate whether a cryptographically secure Cyclic Redundancy Check (CRC)-based Message Authentication Code (CMAC) and a KECCAK-based Message Authentication Code (KMAC) satisfy limitations of resource-constrained IoT devices. We implement the 128-bits CMAC and the 128-bits KMAC in 65nm CMOS and compare their performance. To our best knowledge, no hardware implementations of CMAC and KMAC have been presented so far. Our evaluation shows that, for 1.2V operating voltage and clock frequencies above 1 MHz, the CMAC128 is at least 32 times more area-efficient and at least 21 times more power-efficient than the KMAC128.