Skip to main content

Software Optimization of Advanced Encryption Standard for Ultra-Low-Power MSP430

  • Conference paper
  • First Online:
Software Engineering Trends and Techniques in Intelligent Systems (CSOC 2017)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 575))

Included in the following conference series:

  • 1013 Accesses

Abstract

The Internet of Things (IoT) is undoubtedly a current topic for private and public sector. Nowadays, the communication technologies allow to connect even a simplest physical object often with very limited physical resources. The IoT cover among the others also many areas with sensitive data, where the limited devices are also used. The use of these limited devices keep the security issue as a difficult task. The symmetric ciphers are often considered as a best way to encrypt the communication in the limited devices. Despite the fact that there are many hardware optimized solutions, there are still areas where these solutions cannot be used i.e. due to the limiting price or power. This paper focus on a software optimization of the symmetric cipher on limited micro-controller. Two main implementation are introduced. Further, we provide experimental measurements and possible suggestions for time consumption and memory use reduction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Our described secure communication has been tested in an experimental network in CEZ Distribuce, a.s. (one of the biggest Czech power supplier). The MEg40+ Universal energy meter was installed in the power substation Noviny (Velky Grunov area, the Czech Republic). The Data Concentrator was located in Brno, the Czech Republic. The communication distance was approximately 240 km [14].

References

  1. Masek, P., et al.: Implementation of true IoT vision: survey on enabling protocols and hands-on experience. Int. J. Distrib. Sens. Netw. (2016)

    Google Scholar 

  2. Ruggieri, M., Nikookar, H.: Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems. River Publishess, Aalborg (2013). ISBN 978-87-92982-96-4

    Google Scholar 

  3. Palattella, M.R., et al.: Internet of things in the 5G Era: enablers, architecture, and business models. IEEE J. Sel. Areas Commun. 34(3), 510–527 (2016). ISSN 0733–8716

    Article  Google Scholar 

  4. Ometov, A., et al.: Feasibility characterization of cryptographic primitives for constrained (Wearable) IoT devices. In: IEEE International Conference on Pervasive Computing and Communications, pp. 1–6 (2016). ISBN 978-1-5090-1940-3

    Google Scholar 

  5. Crabtree, A., Mortier, R.: Personal Data, Privacy and the Internet of Things: The Shifting Locus of Agency and Control. SSRN, Elsevier (2016)

    Google Scholar 

  6. Levitt, T.: IoT Governance, Privacy and Security Issues. European Research Cluster on The Internet of Things. European Commission - Information Society and Media (2015)

    Google Scholar 

  7. Yadav, S.K., Relan, N., Bhatia, S.J.: On industrial needs of symmetric cryptography. Int. J. Theor. Appl. Sci. 2(1), 41–44 (2010). ISSN 0975–1718

    Google Scholar 

  8. Damien, G.: BlueKrypt v30.2. Cryptographic Key Length Recommendation (2017)

    Google Scholar 

  9. European Payments Council: Guidelines on Cryptographic Algorithms Usage and Key Management. EPC342-08 Version 6.0 (2016)

    Google Scholar 

  10. European Network and Information Security Agency: Algorithms, Key Sizes and Parameters Report: 2013 Recommendations. Version 1.0 (2013)

    Google Scholar 

  11. U.S. National Institute of Standards and Technology: Recommendatin for Key Management - Part 1: General (Revision 3). NIST Special Publication 800–57 Part 1 Revision 3 (2016)

    Google Scholar 

  12. U.S. National Institute of Standards and Technology: Announcing the Advanced Encryption Standard (AES). Federal Information - Processing Standards Publication 197, FIPS PUB 197 (2001)

    Google Scholar 

  13. Otero, C.T.O., Tse, J., Manohar, R.: AES hardware-software co-design in WSN. In: 21st IEEE International Symposium on Asynchronous Circuits and Systems (ASYNC), pp. 85–92 (2015)

    Google Scholar 

  14. Mlynek, P., Misurec, J., Koutny, M., Raso, O.: Design of secure communication in network with limited resources. In: Proceedings of the 4th European Innovative Smart Grid Technologies (ISGT), pp. 1–5 (2013). ISBN 978-1-4799-2984-9

    Google Scholar 

  15. Mlynek, P., Misurec, J., Koutny, M., Silhavy, P.: Two-port network transfer function for power line topology modeling. Radioengineering 21(1), 356–363 (2012)

    Google Scholar 

  16. Fujdiak, R., et al.: Efficiency evaluation of different types of cryptography curves on low-power devices. In: Proceedings of the 7th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 269–274 (2015). ISBN 978-1-4673-9283-9

    Google Scholar 

  17. Fujdiak, R., et al.: Random number generator in MSP430 x5xx families. Elektrorevue. 4(1), 70–74 (2013). ISSN 1213–1539

    Google Scholar 

  18. Fujdiak, R., Mlynek, P., Misurec, J., Raso, O.: Cryptography in ultra-low power Microcontroller MSP430. Int. J. Eng. Trends Technol. 6(8), 398–404 (2013). ISSN 2231–5381

    Google Scholar 

  19. Fujdiak, R., Misurec, J., Mlynek, P., Leonard, J.G.: Cryptograph key distribution with elliptic curve Diffie-Hellman algorithm in low-power devices for power grids. Rev. Roum. Sci. Tech. Serie Électrotechn. et Énerg. 61(1), 84–88 (2016). ISSN 0035–4066

    Google Scholar 

  20. Texas Instruments: Mixed Signal Microcontroller: MSP430F5438A-EP. Technical documentation SLAS967A (2014)

    Google Scholar 

  21. Mlynek, P., Koutny, M., Misurec, J., Raso, O.: Authentication and encryption DLL library, (Software). http://www.utko.feec.vutbr.cz/~mlynek/dll.html

  22. Texas Instruments: Advanced Encryption Standard, (software). http://www.ti.com/tool/AES-128#descriptionArea

  23. Fujdiak, R.: Measurement of symmetric cipher on low power devices for power grids. In: Proceedings of the 21st Conference STUDENT EEICT, pp. 556–560 (2015). ISBN: 978-80-214-5148- 3

    Google Scholar 

  24. Texas Instruments: MSP430 Optimizing C/C++ Compiler v16.12.0.STS. Technical documentation SLAU132N (2016)

    Google Scholar 

  25. Talha, S.U., et al.: Efficient advance encryption standard (AES) implementation on FPGA using Xilinx system generator. In: 6th IEEE International Conference on Intelligent and Advanced Systems (ICIAS), pp. 1–6 (2016)

    Google Scholar 

  26. Rao, M., Newe, T., Grout, I.: AES implementation on Xilinx FPGAs suitable for FPGA based WBSNs. In: 9th IEEE International Conference on Sensing Technology (ICST), pp. 773–778 (2015)

    Google Scholar 

Download references

Acknowledgement

Research described in this article was financed by the National Sustainability Program under grant LO1401and by the Technology Agency of Czech Republic project No. TA04021490. For the research, the infrastructure of the SIX Centre was used.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Radek Fujdiak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Fujdiak, R., Mlynek, P., Misurec, J., Slacik, J. (2017). Software Optimization of Advanced Encryption Standard for Ultra-Low-Power MSP430. In: Silhavy, R., Silhavy, P., Prokopova, Z., Senkerik, R., Kominkova Oplatkova, Z. (eds) Software Engineering Trends and Techniques in Intelligent Systems. CSOC 2017. Advances in Intelligent Systems and Computing, vol 575. Springer, Cham. https://doi.org/10.1007/978-3-319-57141-6_50

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57141-6_50

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57140-9

  • Online ISBN: 978-3-319-57141-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics