面向嵌入式系统的加密算法性能检测方法
作者:
中图分类号:

TN309.7

基金项目:

国家重点研发计划资助项目(2017YFB0802400);"十三五"国家密码发展基金资助项目(MMJJ20180211);重庆市研究生导师团队建设项目(ydstd1821)。


Methods of encryption algorithm performance detection oriented to embedded system
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [21]
  • |
  • 相似文献 [20]
  • | | |
  • 文章评论
    摘要:

    嵌入式系统信息安全是保障工业控制系统安全的必然要求,然而有限成本的硬件资源可能无法有效支撑加密算法应用所带来的额外计算开销。为研究面向嵌入式系统中加密算法移植的可行性和对系统性能的影响,提出了一个嵌入式系统加密算法性能度量方法,通过构建等效度量实现系统侧和密码侧两部分抽象层次的联系。实验利用该方法,以运行时间延迟、吞吐量和系统资源使用率为度量指标,完成对包括国产加密算法与轻量级算法等在内的多种不同配置加密算法的性能测评。实验结果表明加密算法密钥长度的增长会增加算法执行的延时,算法分组大小的增大会提高算法的运行速度,使用不同加密模式造成的性能影响随加密算法不同而表现出差异性。直接部署加密算法检测任务执行时系统的指标值可以简化测量,相比其他抽象模型在工业场景中的应用更有实际意义。

    Abstract:

    Embedded system security is an inevitable requirement for ensuring the security of industrial control systems. However, the cost-limited hardware resources may not be able to effectively support the additional calculation overhead brought by the application of encryption algorithms. In this paper, we focusd on the feasibility of the migration of encryption algorithms for embedded systems and the impact on the system performance. And a performance benchmark method of encryption algorithm for embedded system was proposed to realize the connection between the system side and the cipher side by constructing equivalent metrics. The experiment carried out by this method covered the performance benchmark of encryption algorithms with different configurations including domestic encryption algorithm and lightweight cryptography algorithm with running time delay, throughput and system resource utilization as metrics. The experimental results show that the increase in the encryption algorithm key length will increase the algorithm execution delay, and the increase in the algorithm packet size will accelerate the algorithm's running speed. The performance impact caused by the use of different encryption modes will vary with the encryption algorithm. Direct deployment of encryption algorithm to detect system index values during task execution can simplify the measurement and is more practical than the application of other abstract models in industrial scene.

    参考文献
    [1] Michael Barr. Embedded systems glossary[M]. Ethiopia:Neutrino Technical Library, 2007.
    [2] Heath, Steve. Embedded systems design[M]. Netherlands:Newnes, 2003.
    [3] Langner R. Stuxnet:dissecting a cyberwarfare weapon[J]. IEEE Security & Privacy Magazine,2011,9(3):49-51.
    [4] Vračar L M, Stojanović M D, Stanimirović A S, et al. Influence of encryption algorithms on power consumption in energy harvesting systems[J]. Journal of Sensors, 2019, 2019:1-9.
    [5] Nandi A, Marcuelescu R. System-level power/performance analysis for embedded systems design[C]//DAC'01:Proceedings of the 38th annual Design Automation Conference. New York, USA:ACM Press, 2001:599-604.
    [6] Mohanty S, Prasanna V K. Rapid system-level performance evaluation and optimization for application mapping onto SoC architectures[C]//15th Annual IEEE International ASIC/SOC Conference. Piscataway, NJ:IEEE, 2002:160-167.
    [7] Zelenova S A, Zelenov S V. Schedulability analysis for strictly periodic tasks in RTOS[J]. Programming & Computer Software, 2018, 44(3):159-169.
    [8] Lee E, Seshia S. Introduction to embedded systems-a cyber-physical systems approach[M]. Cambridge, MA:Mit Press, 2016.
    [9] Douglas R S. 密码学原理与实践[M]. 冯登国,译. 北京:电子工业出版社, 2003:131-142.Douglas R S. Cryptography theory and practice[M]. FENG Dengguo trans. Beijing:Publishing House of Electronics Industry, 2003:131-142. (in Chinese)
    [10] 冯登国. 国内外密码学研究现状及发展趋势[J]. 通信学报, 2002, 23(5):18-26.FENG Dengguo. Status quo and trend of cryptography[J]. Journal on Communications, 2002, 23(5):18-26. (in Chinese)
    [11] 赵军, 曾学文, 郭志川. 支持国产密码算法的高速PCIe密码卡的设计与实现[J]. 电子与信息学报, 2019, 41(10):2402-2408.ZHAO Jun, ZENG Xuewen, GUO Zhichuan. Design and implementation of high speed PCIe cipher card supporting GM algorithms[J]. Journal of Electronics & Information Technology, 2019, 41(10):2402-2408. (in Chinese)
    [12] GM/T 0004-2012, SM3密码杂凑算法[S]. 北京:中国标准出版社, 2012.GM/T 0004-2012, SM3 cryptographic hash algorithm[S]. Beijing:China Standard Press, 2012. (in Chinese)
    [13] GM/T 0002-2012, SM4分组密码算法[S]. 北京:中国标准出版社, 2012.GM/T 0002-2012, SM4 block cipher algorithm[S]. Beijing:China Standard Press, 2012. (in Chinese)
    [14] Bafandehkar M, Yasin S M, Mahmod R, et al. Comparison of ECC and RSA algorithm in resource constrained devices[C]//2013 International Conference on IT Convergence and Security (ICITCS). Piscataway, NJ:IEEE, 2013:1-3.
    [15] Weidler N R, Brown D, Mitchell S A, et al. Return-oriented programming on a resource constrained device[J]. Sustainable Computing:Informatics and Systems, 2019, 22:244-256.
    [16] McKay K A, Bassham L, Turan M S, et al. Report on lightweight cryptography[R]. New York, USA:National Institute of Standards and Technology, 2017.
    [17] Jararweh Y, Tawalbeh L, Tawalbeh H, et al. Hardware performance evaluation of SHA-3 candidate algorithms[J]. Journal of Information Security, 2012, 3(2):69-76.
    [18] Rhett S. Cryptography concepts and effects on control system communications[C]//Sensible Cybersecurity for Power Systems:A Collection of Technical Papers Representing Modern Solutions, 2018.
    [19] Vračar L M, Stojanović M D, Stanimirović A S, et al. Influence of encryption algorithms on power consumption in energy harvesting systems[J]. Journal of Sensors, 2019, 2019:1-9.
    [20] Chu P P. FPGA prototyping by VHDL examples:Xilinx microBlaze MCS SoC[M]. Hoboken, USA:John Wiley & Sons, 2017.
    [21] Sprunt B. The basics of performance-monitoring hardware[J]. IEEE Micro, 2002, 22(4):64-71.
    引证文献
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

柯亚文,蔡挺,夏晓峰,向宏.面向嵌入式系统的加密算法性能检测方法[J].重庆大学学报,2020,43(11):1-10.

复制
分享
文章指标
  • 点击次数:677
  • 下载次数: 907
  • HTML阅读次数: 889
  • 引用次数: 0
历史
  • 收稿日期:2020-07-11
  • 在线发布日期: 2020-12-02
  • 出版日期: 2020-11-30
文章二维码