IMPLEMENTATION OF SYMMETRIC CRYPTOGRAPHY IN EMBEDDED MEASUREMENT SYSTEMS

Authors

  • Wiesław Winiecki
  • Piotr Bilski

DOI:

https://doi.org/10.47839/ijc.14.2.803

Keywords:

measurement, cryptography, embedded systems, distributed measurement systems.

Abstract

The paper presents the implementation of the symmetric cryptography in the distributed measurement system. Motivation for increasing the security in such systems is presented. Next, fundamentals of cryptography from the measuring systems’ point of view are introduced. The role and structure of embedded systems in modern distributed environments is explained. As the example of presented problems, implementation of the AES algorithm on the Compact RIO module is presented and tested for both efficiency and accuracy. The paper is supplemented with conclusions and future prospects of the approach.

References

W. Winiecki, T. Adamski, P. Bobiński, R. Łukaszewski, Security of distributed measurement and control systems, Przegląd Elektrotechniczny (Electrical Review), (LXXXIV) 5 (2008), pp. 220-227. (in Polish).

A. Guruprasad, P. Pandey, B. Prashant, Security features in Ethernet switches for access networks, Proceedings of the Conference on Convergent Technologies for Asia-Pacific Region TENCON 2003, October 15-17, 2003, Vol. 3, pp. 1211–1214.

D. Cheng-Hua, J. Jun, W. Xing-Ming, X. Wen-Yuan, Fast S-box substitution instructions and their hardware implementation for accelerating symmetric cryptographic processing, in Proceeding of the International Conference on E-Business and Information System Security, EBISS'09, 23-24 May 2009.

P. Bilski, W. Winiecki, T. Adamski, Implementation of symmetric cryptography in embedded systems for secure measurement systems, in Proceedings of the I2MTC 2011, Hangzhou, China, 9-12, May 2011, pp. 1288-1293.

A. Biedermann, G. H. Molter, Design methodologies for secure embedded systems, Lecture Notes in Electrical Engineering, Springer, (78) (2011).

F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, FPGA implementations of the DES and Triple-DES masked against power analysis attacks, in Proceedings of the Field Programmable Logic and Applications Conference, Madrid, Spain, Aug. 28-30, 2006.

J. Daemen, R. Govaerts, J. Vandewalle, Weak keys for IDEA, in Proceeding of the Advances in Cryptology, CRYPTO 93, 1993, pp. 224–231.

B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish Encryption Algorithm: A 128-Bit Block Cipher, John Wiley & Sons, New York, 1999.

Announcing the Advanced Encryption Standard (AES), Available: www.nist.gov.

Vartor Crypto-G library, available at http://www.vartortech.com/cryptog.html.

P. Bilski, W. Winiecki, Multi-core implementation of the symmetric cryptography algorithms in the measurement system, Measurement, (43) (2010), pp. 1049-1060.

O. Gervasi, D. Russo, F. Vella, The AES implantation based on OpenCL for multi/many core architecture, in Proceedings of the International Conference on Computational Science and its Applications, 2010, pp.129-134.

T. Good, M. Benaissa, AES on FPGA from the fastest to the smallest, CHES 2005, Lecture Notes in Computer Science, (3659) (2005), pp. 427-440.

R. Doomun, J. Doma, S. Tengur, AES-CBC software execution optimization, in Proceedings International Symposium on Information Technology, ITSim’2008, 26-28 August 2008, Kuala Lumpur, pp. 1-8.

Build reliable and optimized embedded systems with the world's most widely adopted RTOS, available at: http://www.windriver.com/products/vxworks/

W. Winiecki, P. Bilski, Analysis of the time efficiency assessment in the virtual measurement systems, in Proceedings of the IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications IDAACS’09, September 21-23, 2009, Rende (Consenza), Italy, pp. 179-184.

J. Daemen, V. Rijmen, The Design of Rijndael, Springer Verlag, 2002.

Downloads

Published

2015-06-30

How to Cite

Winiecki, W., & Bilski, P. (2015). IMPLEMENTATION OF SYMMETRIC CRYPTOGRAPHY IN EMBEDDED MEASUREMENT SYSTEMS. International Journal of Computing, 14(2), 66-76. https://doi.org/10.47839/ijc.14.2.803

Issue

Section

Articles