Abstract:Authenticated Encryption (AE) is a block cipher mode of operation which provides confidentiality and integrity simultaneously. In terms of the hardware implementation, it produces smaller area compared to two separated algorithms. Therefore, it has become popular and a number of modes have been proposed. This paper presents two efficient hardware implementations for AE schemes, AES-GCM and AEGIS. In terms of AES-GCM, the performance of the system is always determined by the Galois Hash (GHASH) architecture bec… Show more
“…The round function of each round of the AES algorithm must go through the process of byte substitution, row shift, column mixing transformation, and round key addition operation. Compared with other algorithms, the AES algorithm is more symmetrical, and the expression is simple and easy to understand [23]. Byte substitution is the only nonlinear transformation in the algorithm.…”
Section: Mobile Iot Information Security Encryption Algorithmmentioning
The progress of the social economy and the rapid development of the power field have created more favorable conditions for the construction of my country’s power grid. In this network age, how to further realize the connection between the power system and the Internet of Things is the key content of many scholars’ research. In the Internet of Things environment, there have been many excellent results in the collection, storage, and management of electric power big data, but the problem of information security has not been completely solved. Based on big data analysis and Internet of Things technology, this paper studies the architecture design of power information security terminals. In view of the diverse types of power grid mobile information and the large amount of data, this paper designs a power transportation mobile information security management system structure, which improves the effective management of power data by the system through big data, smart sensors, and wireless communication technology. According to the experiment, the power information security terminal constructed in this paper can effectively reduce communication resources and save communication costs in the process of aggregating multidimensional data. In the user satisfaction survey, residents’ satisfaction with the convenience and safety of the intelligent power system is also as high as 9.312 and 9.233. On the whole, the application of big data and Internet of Things technology to the construction of power information security terminals can indeed improve the service efficiency of power companies under the premise of ensuring safety and allow users to have a better experience.
“…The round function of each round of the AES algorithm must go through the process of byte substitution, row shift, column mixing transformation, and round key addition operation. Compared with other algorithms, the AES algorithm is more symmetrical, and the expression is simple and easy to understand [23]. Byte substitution is the only nonlinear transformation in the algorithm.…”
Section: Mobile Iot Information Security Encryption Algorithmmentioning
The progress of the social economy and the rapid development of the power field have created more favorable conditions for the construction of my country’s power grid. In this network age, how to further realize the connection between the power system and the Internet of Things is the key content of many scholars’ research. In the Internet of Things environment, there have been many excellent results in the collection, storage, and management of electric power big data, but the problem of information security has not been completely solved. Based on big data analysis and Internet of Things technology, this paper studies the architecture design of power information security terminals. In view of the diverse types of power grid mobile information and the large amount of data, this paper designs a power transportation mobile information security management system structure, which improves the effective management of power data by the system through big data, smart sensors, and wireless communication technology. According to the experiment, the power information security terminal constructed in this paper can effectively reduce communication resources and save communication costs in the process of aggregating multidimensional data. In the user satisfaction survey, residents’ satisfaction with the convenience and safety of the intelligent power system is also as high as 9.312 and 9.233. On the whole, the application of big data and Internet of Things technology to the construction of power information security terminals can indeed improve the service efficiency of power companies under the premise of ensuring safety and allow users to have a better experience.
“…L. Henzen et al [54] have presented his 100 Gbps implementation of the AES-GCM algorithm for Ethernet application on Xilinx Virtex 5 FPGA. K. M. Abdellatif et al [55], [56] has shown his high-speed implementation for slow-changing key application and AEGIS algorithm using Xilinx Virtex 5 FPGA. Besides, Y. Zhang et al [52] have presented the high throughput implementation of the AES-GCM algorithm using pipeline architecture on Xilinx Virtex-5 FPGA.…”
High-speed data communication is becoming essential for many applications, including satellite communication. The security algorithms associated with the communication of information are also required to have high-speed for coping up with the communication speed. Moreover, the Authenticated Encryption (AE) algorithms provide high-speed communication and security services include data encryption, authentication, and integrity. The AE algorithms are available with serial and parallel architectures; among them, the Galois Counter Mode (GCM) algorithm has a parallel architecture. The Synthetic Initialization Vector (SIV) mode in the AES-GCM-SIV algorithm provides the nonce misuse protection using the GCM algorithm. Besides, reduced data throughput is provided using the AES-GCM-SIV algorithm as compared to the AES-GCM algorithm. This work introduced a parallel algorithm with re-keying and randomization of the initialization vector for high data throughput, nonce misuse protection, and side-channel attack protection. The implementation of the proposed algorithm is performed on Field Programmable Gate Array (FPGA) and it's compared with the FPGA implementations of AES-GCM, AES-GCM-SIV, and recently introduced algorithms. The optimization of the proposed algorithm and security analysis is presented for space application using different optimizations and a combination of optimizations.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.