ASIC-oriented comparative review of hardware security algorithms for internet of things applications

2016 28th International Conference on Microelectronics (ICM)(2016)

引用 30|浏览7
暂无评分
摘要
Research into the security of the Internet of Things (IoT) needs to utilize particular algorithms that offer ultra-low power consumption and a long lifespan, along with other parameters such as strong immunity against attacks, lower chip area and acceptable throughput. This paper offers an ASIC-oriented comparative review of the most popular and powerful cryptographic algorithms worldwide, namely AES, 3DES, Twofish and RSA. The ASIC implementations of those algorithms are analyzed by studying statistical data extracted from the ASIC layouts of the algorithms and comparing them to determine the most suited algorithms for IoT hardware-security applications. The AES algorithm is found to be the most suitable algorithm for IoT applications.
更多
查看译文
关键词
Internet of Things (IoT),Hardware Security,Application Specific Integrated Circuit (ASIC),Cryptography,Cryptographic Algorithms,AES,3DES,Twofish,RSA
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要