Khan, Safiullah ORCID: https://orcid.org/0000-0001-8342-6928, Lee, Wai-Kong ORCID: https://orcid.org/0000-0003-4659-8979, Karmakar, Angshuman ORCID: https://orcid.org/0000-0003-2594-588X, Mera, Jose Maria Bermudo ORCID: https://orcid.org/0000-0003-0457-5728, Majeed, Abdul ORCID: https://orcid.org/0000-0002-3030-5054 and Hwang, Seong Oun ORCID: https://orcid.org/0000-0003-4240-6255 (2023) Area-time efficient implementation of NIST lightweight hash functions targeting IoT applications. IEEE Internet of Things Journal, 10 (9). pp. 8083-8095.
Published Version
File not available for download. Available under License In Copyright. Download (5MB) |
Abstract
To mitigate cybersecurity breaches, secure communication is crucial for the Internet of Things (IoT) environment. Data integrity is one of the most significant characteristics of security, which can be achieved by employing cryptographic hash functions. In view of the demand from IoT applications, the National Institute of Standards and Technology (NIST) initiated a standardization process for lightweight hash functions. This work presents field-programmable gate array (FPGA) implementations and carefully worked out optimizations of four Round-3 finalists in the NIST standardization process. A novel compact PHOTON-Beetle implementation is proposed wherein the underlying matrix multiplication is executed in serialized fashion to achieve a small hardware footprint. Sparkle implementations are carried out by implementing the ARX-box in serialized, parallelized, and hybrid approaches. For Ascon and Xoodyak, the proposed implementations compute certain permutation rounds in one clock cycle in order to explore the tradeoff between computation time and hardware area. As a result, this work achieves the smallest hardware footprint for PHOTON-Beetle consuming an area 3.4 × smaller than state-of-the-art implementations. Ascon and Xoodyak are implemented in a flexible manner that achieves throughput-to-area (TP/A) ratios 1.8 × and 3.9 × higher, respectively, compared to implementations found in the literature. In addition, we propose the first FPGA implementations for the Sparkle hash function. These efficient implementations provide guidelines for choosing a suitable architecture for applications in demand that can be employed in the IoT environment to achieve data integrity for various applications.
Impact and Reach
Statistics
Additional statistics for this dataset are available via IRStats2.