WSEAS Transactions on Information Science and Applications
Print ISSN: 1790-0832, E-ISSN: 2224-3402
Volume 10, 2013
Experimental Analysis and Implementation of Bit Level Permutation Instructions for Embedded Security
Authors: , , , , ,
Abstract: With the increasing use of electronic control units (ECU’s) in automobile or in any embedded system security becomes an area of grave concern. Information is exchanged between ECU’s over a CAN (Control Area Network) bus, vehicle to infrastructure (V2I) and vehicle to vehicle (V2V) communication. These interactions open a wide gateway for manipulating information which could lead to disastrous results. EVITA, SEVECOM, SHE are existing security models to address these concerns in automobiles but at the cost of huge footprint area and more power consumption as it uses cryptographic engines like AES-128,ECC, HMAC. We propose the use of bit level permutation GRP (group operations) in cryptographic environment which not only accelerates cryptography but also has a positive impact of providing low cost security solution that is having good encryption standards, relatively less footprint area, less cost and low power consumption. Use of GRP in cryptographic environment is a unique solution for all security applications where footprint area and power consumption are constraints .This paper shows implementation of GRP in embedded C, over a CAN bus on ARM7(LPC2129) and on FPGA. It is the first successful attempt to have universal and optimized structure of GRP and its implementation. Measures on side channel attacks on GRP like differential power analysis (DPA) are incorporated in this paper. This architecture with the use of bit permutation instruction will pave a new way in securing small scale embedded system.