Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation

Abstract Information security is essential to ensure security of exchanged sensitive data in resource‐constrained devices (RCDs) because they are used widely in the Internet of things (IoT). The implementation of special ciphers is required in these RCDs, as they have many limitations and constraint...

Full description

Saved in:
Bibliographic Details
Main Authors: Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad Alshayeji
Format: Article
Language:English
Published: Wiley 2021-03-01
Series:IET Circuits, Devices and Systems
Subjects:
Online Access:https://doi.org/10.1049/cds2.12011
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832546687369871360
author Sa'ed Abed
Reem Jaffal
Bassam Jamil Mohd
Mohammad Alshayeji
author_facet Sa'ed Abed
Reem Jaffal
Bassam Jamil Mohd
Mohammad Alshayeji
author_sort Sa'ed Abed
collection DOAJ
description Abstract Information security is essential to ensure security of exchanged sensitive data in resource‐constrained devices (RCDs) because they are used widely in the Internet of things (IoT). The implementation of special ciphers is required in these RCDs, as they have many limitations and constraints, such as low power/energy dissipation, and require low hardware resources. The SM4 cipher is one of the common block ciphers, which can be easily implemented and offers a high level of security. The objective of this study is to determine the optimum field‐programmable gate array (FPGA) design for SM4 to facilitate reconfiguring the FPGA with an optimum design during operation. Various FPGA design options for SM4 ciphers are examined, and the performance metrics are modeled: power, energy, area, and speed. Scalar and pipelined designs with one or multiple hardware rounds are considered without altering the cipher algorithm. The results show that the best scalar implementation utilises less resources than the pipelined implementations by 7%. Alternatively, pipelined implementations perform better regarding speed and energy dissipation by 10 times and 40% of the scalar implementation, respectively. The pipeline implementations with eight or 16 rounds are optimum for continuous streams of data, and the two‐round design is the optimum design across ciphers.
format Article
id doaj-art-ae1e23d4b2dc4d709aa1e454d10e02b1
institution Kabale University
issn 1751-858X
1751-8598
language English
publishDate 2021-03-01
publisher Wiley
record_format Article
series IET Circuits, Devices and Systems
spelling doaj-art-ae1e23d4b2dc4d709aa1e454d10e02b12025-02-03T06:47:36ZengWileyIET Circuits, Devices and Systems1751-858X1751-85982021-03-0115212113510.1049/cds2.12011Performance evaluation of the SM4 cipher based on field‐programmable gate array implementationSa'ed Abed0Reem Jaffal1Bassam Jamil Mohd2Mohammad Alshayeji3Department of Computer Engineering Kuwait University Kuwait City KuwaitDepartment of Computer Engineering Kuwait University Kuwait City KuwaitDepartment of Computer Engineering The Hashemite University Zarqa JordanDepartment of Computer Engineering Kuwait University Kuwait City KuwaitAbstract Information security is essential to ensure security of exchanged sensitive data in resource‐constrained devices (RCDs) because they are used widely in the Internet of things (IoT). The implementation of special ciphers is required in these RCDs, as they have many limitations and constraints, such as low power/energy dissipation, and require low hardware resources. The SM4 cipher is one of the common block ciphers, which can be easily implemented and offers a high level of security. The objective of this study is to determine the optimum field‐programmable gate array (FPGA) design for SM4 to facilitate reconfiguring the FPGA with an optimum design during operation. Various FPGA design options for SM4 ciphers are examined, and the performance metrics are modeled: power, energy, area, and speed. Scalar and pipelined designs with one or multiple hardware rounds are considered without altering the cipher algorithm. The results show that the best scalar implementation utilises less resources than the pipelined implementations by 7%. Alternatively, pipelined implementations perform better regarding speed and energy dissipation by 10 times and 40% of the scalar implementation, respectively. The pipeline implementations with eight or 16 rounds are optimum for continuous streams of data, and the two‐round design is the optimum design across ciphers.https://doi.org/10.1049/cds2.12011cryptographyfield programmable gate arrayssecurity of dataInternet of Things
spellingShingle Sa'ed Abed
Reem Jaffal
Bassam Jamil Mohd
Mohammad Alshayeji
Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
IET Circuits, Devices and Systems
cryptography
field programmable gate arrays
security of data
Internet of Things
title Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
title_full Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
title_fullStr Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
title_full_unstemmed Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
title_short Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation
title_sort performance evaluation of the sm4 cipher based on field programmable gate array implementation
topic cryptography
field programmable gate arrays
security of data
Internet of Things
url https://doi.org/10.1049/cds2.12011
work_keys_str_mv AT saedabed performanceevaluationofthesm4cipherbasedonfieldprogrammablegatearrayimplementation
AT reemjaffal performanceevaluationofthesm4cipherbasedonfieldprogrammablegatearrayimplementation
AT bassamjamilmohd performanceevaluationofthesm4cipherbasedonfieldprogrammablegatearrayimplementation
AT mohammadalshayeji performanceevaluationofthesm4cipherbasedonfieldprogrammablegatearrayimplementation