VTechWorks staff will be away for the Independence Day holiday from July 4-7. We will respond to email inquiries on Monday, July 8. Thank you for your patience.
 

Message Authentication Codes On Ultra-Low SWaP Devices

dc.contributor.authorLiao, Che-Hsienen
dc.contributor.committeechairHicks, Matthewen
dc.contributor.committeememberChung, Taejoong Tijayen
dc.contributor.committeememberLu, Chang Tienen
dc.contributor.departmentComputer Scienceen
dc.date.accessioned2022-05-28T08:00:16Zen
dc.date.available2022-05-28T08:00:16Zen
dc.date.issued2022-05-27en
dc.description.abstractThis thesis focuses on specific crypto algorithms, Message Authentication Codes (MACs), running on ultra-low SWaP devices. The type of MACs we used is hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC). The most important thing about ultra-low SWaP devices is their energy usage. This thesis measures different implementations' execution times on ultra-low SWaP devices. We could understand which implementation is suitable for a specific device. In order to understand the crypto algorithm we used, this thesis briefly introduces the concept of hash-based message authentication codes (HMAC) and cipher-block-chaining message authentication code (CBC-MAC) from a high level, including their usage and advantage. The research method is empirical research. This thesis determines the execution times of different implementations. These two algorithms (HMAC and CBC-MAC) contain three implementations. The result comes from those implementations running on the devices we used.en
dc.description.abstractgeneralThe deployments of 5G cellular networks are now onboard. The demand increased due to consumers and the availability of more affordable devices. The amount of investment in 5G technology and infrastructure increases market interest in IoT. The 5G network security is essential. How to secure user privacy and their sensitive data while they use 5g network has become a big issue and needs to be solved. However, not all popular crypto algorithms are suited to all devices, especially in those resource-limited microcontrollers. In this thesis, we will deal with Message Authentication Codes that provide the data integrity check. With resource limit devices, energy usage is an important issue. We will identify which implementations have better energy usage depending on the device features. This thesis will use three implementations for each algorithm. The result of our experiment provide a straightforward way that helps people understand which implementation can run more efficiently on specific ultra-low devices.en
dc.description.degreeMaster of Scienceen
dc.format.mediumETDen
dc.identifier.othervt_gsexam:35196en
dc.identifier.urihttp://hdl.handle.net/10919/110360en
dc.language.isoenen
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectCryptographyen
dc.subjectHMACen
dc.subjectAES-CMACen
dc.subjectUltra-Low SWaP Devicesen
dc.titleMessage Authentication Codes On Ultra-Low SWaP Devicesen
dc.typeThesisen
thesis.degree.disciplineComputer Science and Applicationsen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Liao_C_T_2022.pdf
Size:
845.55 KB
Format:
Adobe Portable Document Format

Collections