• DocumentCode
    3674790
  • Title

    Suit up! -- Made-to-Measure Hardware Implementations of ASCON

  • Author

    Groß;Erich Wenger;Christoph Dobraunig; Ehrenhöfer

  • Author_Institution
    Inst. for Appl. Inf. Process. &
  • fYear
    2015
  • Firstpage
    645
  • Lastpage
    652
  • Abstract
    Having ciphers that provide confidentiality and authenticity, that are fast in software and efficient in hardware, these are the goals of the CAESAR authenticated encryption competition. In this paper, the promising CAESAR candidate ASCON is implemented in hardware and optimized for different typical applications to fully explore ASCON´s design space. Thus, we are able to present hardware implementations of Ascon suitable for RFID tags, Wireless Sensor Nodes, Embedded Systems, and applications that need maximum performance. For instance, we show that an ASCON implementation with a single unrolled round transformation is only 7 kGE large, but can process up to 5.5 Gbit/sec of data (0.75 cycles/byte), which is already enough to encrypt a Gigabit Ethernet connection. Besides, ASCON is not only fast and small, it can also be easily protected against DPA attacks. A threshold implementation of ASCON just requires about 8 kGE of chip area, which is only 3.1 times larger than the unprotected low-area optimized implementation.
  • Keywords
    "Hardware","Encryption","Throughput","Registers","Wireless sensor networks","Wireless communication"
  • Publisher
    ieee
  • Conference_Titel
    Digital System Design (DSD), 2015 Euromicro Conference on
  • Type

    conf

  • DOI
    10.1109/DSD.2015.14
  • Filename
    7302339