2018 Conference on Design of Circuits and Integrated Systems (DCIS) 2018
DOI: 10.1109/dcis.2018.8681469
|View full text |Cite
|
Sign up to set email alerts
|

System-on-Programmable-Chip AES-GCM implementation for wire-speed cryptography for SAS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In addition, the ChaCha20-Poly1305 cipher suite was introduced in the protocol to increase the performance and resistance of side-channel attacks in software implementations. As such, the cipher suites used in the current version of TLS are AES-GCM [24,25], AES-CCM [26,27], and ChaCha20-Poly1305 [28]. Figure 2 shows the handshake protocol in TLS 1.3.…”
Section: Transport Layer Securitymentioning
confidence: 99%
“…In addition, the ChaCha20-Poly1305 cipher suite was introduced in the protocol to increase the performance and resistance of side-channel attacks in software implementations. As such, the cipher suites used in the current version of TLS are AES-GCM [24,25], AES-CCM [26,27], and ChaCha20-Poly1305 [28]. Figure 2 shows the handshake protocol in TLS 1.3.…”
Section: Transport Layer Securitymentioning
confidence: 99%
“…This new revision of the IEC 62351-6 standard includes AES Galois/Counter Mode (AES-GCM), to allow to provide both data authentication and encryption. This algorithm has proven to be extremely efficient and achieves both high data throughput and low latency when implemented in hardware [5], [36]- [38]. However, encryption is still a challenge.…”
Section: B State Of the Art In Iec 62361-6mentioning
confidence: 99%
“…If a key is available, this section provides to the AES-GCM engine all the parameters needed to perform frame protection. analyzed in [5] and it has been specifically designed to support different latency/silicon-resources trade-off attending the targeted performance. It has four main phases that are carried out for each frame that needs to be processed:…”
Section: Encryption/decryption Controllermentioning
confidence: 99%
See 1 more Smart Citation
“…As presented in this paper, the security means for stringent real-time traffic requires wire-speed cryptography to ensure low and deterministic latency times and robust security key management schemes [66]. For example, in the context of the electric sector, the scheduled traffic in a TSN network can be composed of layer-2 GOOSE and sampled measured value (SMV), previously described.…”
Section: Wire-speed Cryptography For Real-time Trafficmentioning
confidence: 99%