z-logo
open-access-imgOpen Access
Flexible and high‐throughput structures of Camellia block cipher for security of the Internet of Things
Author(s) -
Rashidi Bahram
Publication year - 2021
Publication title -
iet computers and digital techniques
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.219
H-Index - 46
eISSN - 1751-861X
pISSN - 1751-8601
DOI - 10.1049/cdt2.12025
Subject(s) - computer science , block cipher , cipher , encryption , throughput , cryptography , block size , ciphertext , embedded system , parallel computing , key (lock) , computer engineering , computer network , algorithm , wireless , operating system
The advancements in wireless communication have created exponential growth in the Internet of Things (IoT) systems. Security and privacy of the IoT systems are critical challenges in many data‐sensitive applications. Herein, high‐throughput and flexible hardware implementations of the Camellia block cipher for IoT applications are presented. In the proposed structures, sub‐blocks of the ciphers are implemented based on optimised circuits. The proposed structures for Camellia are designed and shared for implementing the encryption process and generating some intermediate key values in the two separate times. The most complex block in these ciphers is the substitution box (S‐box). The S‐boxes are implemented based on area‐optimised logic circuits. The Camellia S‐boxes consist of a field inversion overF2 8and two affine transformations overF 2 . The inversion operation is implemented over the composite fieldF(2 4)2instead of an inversion overF2 8which is an important factor to reduce area consumption. A large number of gates, in the structure, have been implemented by 2‐input NAND and 2‐input NOR gates to reduce delay and area. Also, the flexible structure for Camellia that can do various configurations of this cipher to support variable key sizes 128, 192 and 256 bits was proposed. Implementation results of the proposed architectures in 180 nm CMOS technology for different key sizes are achieved. The results show improvements in terms of execution time, throughput and throughput/area compared to the other related works.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here