IMPLEMENTATION OF SYMMETRIC CRYPTOGRAPHY IN EMBEDDED MEASUREMENT SYSTEMS
DOI:
https://doi.org/10.47839/ijc.14.2.803Keywords:
measurement, cryptography, embedded systems, distributed measurement systems.Abstract
The paper presents the implementation of the symmetric cryptography in the distributed measurement system. Motivation for increasing the security in such systems is presented. Next, fundamentals of cryptography from the measuring systems’ point of view are introduced. The role and structure of embedded systems in modern distributed environments is explained. As the example of presented problems, implementation of the AES algorithm on the Compact RIO module is presented and tested for both efficiency and accuracy. The paper is supplemented with conclusions and future prospects of the approach.References
W. Winiecki, T. Adamski, P. Bobiński, R. Łukaszewski, Security of distributed measurement and control systems, Przegląd Elektrotechniczny (Electrical Review), (LXXXIV) 5 (2008), pp. 220-227. (in Polish).
A. Guruprasad, P. Pandey, B. Prashant, Security features in Ethernet switches for access networks, Proceedings of the Conference on Convergent Technologies for Asia-Pacific Region TENCON 2003, October 15-17, 2003, Vol. 3, pp. 1211–1214.
D. Cheng-Hua, J. Jun, W. Xing-Ming, X. Wen-Yuan, Fast S-box substitution instructions and their hardware implementation for accelerating symmetric cryptographic processing, in Proceeding of the International Conference on E-Business and Information System Security, EBISS'09, 23-24 May 2009.
P. Bilski, W. Winiecki, T. Adamski, Implementation of symmetric cryptography in embedded systems for secure measurement systems, in Proceedings of the I2MTC 2011, Hangzhou, China, 9-12, May 2011, pp. 1288-1293.
A. Biedermann, G. H. Molter, Design methodologies for secure embedded systems, Lecture Notes in Electrical Engineering, Springer, (78) (2011).
F.-X. Standaert, G. Rouvroy, J.-J. Quisquater, FPGA implementations of the DES and Triple-DES masked against power analysis attacks, in Proceedings of the Field Programmable Logic and Applications Conference, Madrid, Spain, Aug. 28-30, 2006.
J. Daemen, R. Govaerts, J. Vandewalle, Weak keys for IDEA, in Proceeding of the Advances in Cryptology, CRYPTO 93, 1993, pp. 224–231.
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, and N. Ferguson, The Twofish Encryption Algorithm: A 128-Bit Block Cipher, John Wiley & Sons, New York, 1999.
Announcing the Advanced Encryption Standard (AES), Available: www.nist.gov.
Vartor Crypto-G library, available at http://www.vartortech.com/cryptog.html.
P. Bilski, W. Winiecki, Multi-core implementation of the symmetric cryptography algorithms in the measurement system, Measurement, (43) (2010), pp. 1049-1060.
O. Gervasi, D. Russo, F. Vella, The AES implantation based on OpenCL for multi/many core architecture, in Proceedings of the International Conference on Computational Science and its Applications, 2010, pp.129-134.
T. Good, M. Benaissa, AES on FPGA from the fastest to the smallest, CHES 2005, Lecture Notes in Computer Science, (3659) (2005), pp. 427-440.
R. Doomun, J. Doma, S. Tengur, AES-CBC software execution optimization, in Proceedings International Symposium on Information Technology, ITSim’2008, 26-28 August 2008, Kuala Lumpur, pp. 1-8.
Build reliable and optimized embedded systems with the world's most widely adopted RTOS, available at: http://www.windriver.com/products/vxworks/
W. Winiecki, P. Bilski, Analysis of the time efficiency assessment in the virtual measurement systems, in Proceedings of the IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications IDAACS’09, September 21-23, 2009, Rende (Consenza), Italy, pp. 179-184.
J. Daemen, V. Rijmen, The Design of Rijndael, Springer Verlag, 2002.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.