Analysis of hardware support of cryptography in Internet of Things-devices
DOI:
https://doi.org/10.18372/2225-5036.24.12491Keywords:
cryptoaccelerators, IoT, microcontrollers, embedded systems, encryption, hash, RNGAbstract
This article analyzes the features and functionality of embedded cryptographic accelerators in 8/16/32-bit general purpose microcontrollers designed to adapt traditional cryptography to the requirements of IoT-devices. It is established that traditional cryptographic algorithms and protocols used on the Internet in the case of software implementation do not meet the requirements of things related to –devices, the speed, the amount of memory required, and power consumption. The tendencies of development of light weight cryptography and cryptoaccelerators in microcontrollers from the point of view of balance of safety, cost and productivity are shown. The performance gain in the use of cryptographic accelerators for encryption, hashing and generation of random numbers in comparison with optimized software implementations is estimated. In particular, it is noted that the use of cryptographic accelerators allows to raise the speed of AES encryption 10-20 times for 8/16-bit processors and up to 150 times for 32-bit compared with software implementations of the algorithm. The growth of the SHA-1, SHA-256 hash rate algorithms in 32-bit microcontrollers is more than 100 times faster, and the НМАС is approaching 500. This allows 32-bit processors to use traditional cryptographic algorithms and protocols without significant constraints. It has also been shown that 32-bit microcontrollers have a trend towards the implementation of comprehensive security solutions that not only accelerate a wide range of symmetric and asymmetric algorithms and protocols, but also provide the ability to securely store and generate keys, securely download and update code, support digital signatures, and certificates. It is noted that manufacturers of microcontrollers are increasingly forced to pay attention to physical and algorithmic methods of protecting cryptographic accelerators from attacks through side-channels, in the first place attacks of analysis of power consumption, which constitute the main danger to devices of the Internet of things.
References
D. Evans, «The Internet of Things: How the Next Evolution of the Internet Is Changing Everything». URL: https://www.cisco.com/c/dam/en_us /about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf.
NIST SP 800-38D: Recommendations for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC. Gaithersburg: National Institute of Standards and Technology, 39 p., 2007.
CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. URL: http://competitions.cr.¬yp.to /caesar.html.
S. Gueron, «Intel Advanced Encryption Standard (AES) Instructions Set». URL: https:// software.intel.com/sites/default/files/m/d/4/1/d/8/AES_WP_Rev_03_Final_2010_01_26.pdf.
S. Gueron, «AES-GCM for Efficient Authenticated Encryption Ending the Reign of HMAC-SHA-1?». URL: https://crypto.stanford.edu/RealW orldCrypto/slides/gueron.pdf.
Intel, «Intel Architecture Instruction Set Extensions Programming Reference». URL: https:// software.intel.com/sites/default/files/managed/b4/3a/319433024.pdf?_ga=1.118002441.1853754838.1418826886.
С. Смышляев, Е. Алексеев, А. Прохоров, «ГОСТ 28147-89: «Не спеши его хоронить». Часть 2. Эффективные реализации алгоритма». URL: http://www.cryptopro.ru/en/blog/2015/01/14/gost-28147-89-ne-speshi-ego-khoronit-chast-2-effektivnye-realizatsii-algoritma.
Intel, «Digital Random Number Generator. Software Implementation Guide». URL https://softw are.intel.com/sites/default/files/manage/4d/91/DRNG_Software_Implementation_Guide_2.0.pdf.
Cryptovia cryptographic libraries for embedded systems. URL: http://cryptovia.com/cryp tographic-libraries-for-avr-cpu/.
S. Didla, A. Ault, S. Bagchi, «Optimizing AES for embedded devices and wireless sensor networks», Proceedings of the 4th Int. Conf. on Testbeds and research infrastructures for the development of networks & communities, p. 1-10, 2008.
D. Flowers, H. Schlunder, «Data Encryption Routines for PIC24 and dsPIC Devices». URL: http:// ww1.microchip.com/downloads/ en/AppNotes/AN1044a.pdf.
K. Atasu, L. Breveglieri, M. Macchetti, «Effic ient AES implementations for ARM based platforms», Proceedings of the ACM symposium on Applied computing, p. 841-845, 2004.
Ekelund. Low Energy AES Hardware for Microcontroller, Thesis, Moss, 96 p., 2009.
D. Osvik, «Fast embedded software has hing». URL: https://eprint.iacr.org/ 2012/156.pdf.
J. Birr-Pixton, «Benchmarking Modern Auth enticated Encryption on €1 devices». URL: https://jb p.io/2015/06/01/modern-auth entica ted-encryption-for-1-euro.html.
Atmel, «XMEGA AU Manual». URL: https: //eewiki.net/download/attachments/31588436/XMEGAAU_Manual.pdf?version=1&modificationDate=1396389661997&api=v2.
STMicroelectronics, «RM0031. Reference Manual». URL: http://www.st.com/content/cc/resou rce/technical/document/reference_manual/2e/3b/8c/8f/60/af/4b/2c/CD00218714.pdf/files/CD00218714.pdf/jcr:content/translations/en.CD00218714.pdf.
Silicon Labs, «User Manual. C8051F96x». URL: https://www.silabs.com/documents/public/da ta-sheets/C8051F96x.pdf.
Texas Instruments, «User's Guide. MSP430x5xx/6xx Family». URL: http://www.ti.com /lit/ug/slau208q/slau208q.pdf.
Texas Instruments, «User's Guide. MSP430FR58xx/59xx/68xx, and MSP430FR69xx Fa mily». URL: http://www.ti.com/lit/ug/slau367o/sla u367o.pdf.
Microchip Technology, «PIC24FJ128GA204 Family. Datasheet». URL: http://ww1.micrchip.com/d ownloads/en/DeviceDoc/30010038c pdf.
Atmel, «SAM7XC512/256/128 Datasheet». URL: http://ww1.microchip.com/downloads/en/Device Doc/Atmel-6209-32-bit-ARM7TDMIMicro controller-SAM7XC512-SAM7XC256-SAM7XC128_Da tasheet.pdf.
Atmel, «SAM L21 Family Datasheet». URL: http://www.farnell.com/data sheets/2014285.pdf.
Atmel, «SAM D5x/E5x Family Datasheet». URL: https://www.mouser.com/ds/2/268/60001507 A-1130176.pdf.
Atmel, «SAM E70/S70/V70/V71 Family Datasheet».URL: https://www.mous er.com/ds/2/268 /60001527A-1284321.pdf.
Texas Instruments, «Technical Reference Manual. MSP432P4xx Family». URL: http://www.ti.c om/lit/ug/slau356h/slau356h.pdf.
Texas Instruments, «Tiva TM4C129D NCPDT Microcontroller Datasheet». URL: http://www.ti.com/lit/ ds symlink/tm4c129dncpdt.pdf.
Renesas Electronics, «Renesas 32-Bit MCU RX Family / RX600 Series. RX65N Group, RX651 Group User’s Manual: Hardware». URL: https://media.di gkey.com/pdf/Data%20Sheets/Renesas/RX65N_RX651_Group_HM_Rev2.10_Oct2017.pdf.
Renesas Electronics, «Advanced Synergy Security». [Online]. Available at: https://www2.renesa s.eu/syn_conf_downloads/it/Lectures/15%20Advanced%20Synergy%20Security.pdf.
Silicon Labs, «SiM3U1xx/C1xx Reference Manual». URL: https://www.silabs.com/documents/ public/data-sheets/SiM3U1xx-SiM3¬C1xx-RM.pdf.
Silicon Labs, «EFM32 Giant Gecko 11 Family Reference Manual». URL: https://ww.silabs.com/documen ts/public/referencemanuals/EFM32GGRM.pdf.
STMicroelectronics, «STM32H7x3 advanced ARM-based 32-bit MCUs. Reference Manual». URL: http://www.st.com/content/ccc/resource/technical/document/reference_manual/group0/c9/a3/76/fa/55/46/45/fa/DM00314099/files/DM00314099.pdf/jcr:content/translations/en.DM00314099.pdf.
А. Самоделов, «Криптография в отдельном блоке: криптографический сопроцессор семейства STM32F4xx», Новости Электроники, № 6 (108), с. 12-25, 2012.
Я. Совин, Ю. Наконечний, М. Стахів, «Дослідження характеристик вбудованого генератора випадкових чисел мікроконтролерів родини STM32F4XX згідно з методикою NIST STS», Вісник НУ «Львівська політехніка». Серія «Автоматика, вимірювання та керування», № 753, c. 37-44, 2013.