Paper
16 January 2024 On the application of inexact computation for low power SHA-256
Ahmed Shaaban Ismail, Ahmed Shalaby, Mohamed Fathy Abu-Elyazeed
Author Affiliations +
Proceedings Volume 12973, Workshop on Electronics Communication Engineering (WECE 2023); 1297307 (2024) https://doi.org/10.1117/12.3015633
Event: Workshop on Electronics Communication Engineering (WECE 2023), 2023, Guilin, China
Abstract
The adoption of IoT has raised concerns about security as life-threatening attacks become more common. To address this, ultra-lightweight secure SoCs become a demand to ensure trusted operation in the presence of untrusted IPs while meeting power and area constraints. Integrity, one of the main components of security, is the prevention of protected data modification without detection. Hash functions are used to ensure data integrity in secure systems. In this paper, we propose a low-power implementation of a hash function by using approximate adders in SHA-256 implementation. First, approximate adders’ designs were investigated, where we tested the output uniqueness of each of them, as the output uniqueness of an adder improves the properties of hash results. Then, the chosen adders are utilized for hash implementation. Next, the Avalanche test is applied to evaluate the properties of the proposed hash functions. Synthesis and simulation results show that using an approximate adder reduces the power consumed in the combinational part by up to 66% while the avalanche test results are reduced gradually from 50% to 25%.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Ahmed Shaaban Ismail, Ahmed Shalaby, and Mohamed Fathy Abu-Elyazeed "On the application of inexact computation for low power SHA-256", Proc. SPIE 12973, Workshop on Electronics Communication Engineering (WECE 2023), 1297307 (16 January 2024); https://doi.org/10.1117/12.3015633
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Power consumption

Histograms

Computer security

Mathematical optimization

Prototyping

Industrial applications

Logic devices

Back to Top