Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Profiling of symmetric-encryption algorithms for a novel biomedical-implant architecture
Strydis C., Zhu D., Gaydadjiev G.  Computing frontiers (Proceedings of the 2008 Conference on Computing Frontiers, Ischia, Italy, May 5-7, 2008)231-240.2008.Type:Proceedings
Date Reviewed: Oct 3 2008

Biomedical microelectronic implants (BMI) are useful actuators and diagnostic devices in applications such as intra-cardiac defibrillators, implantable pacemakers, and blood or gastric pressure measurement. BMIs are capable of accepting commands to self-adjust internal operations and of relaying the biological data of patients (BDOP) to logging stations for prognosis and evaluation. Thus, it is important to securely transmit the BDOP and maintain the integrity of commands to the BMI. How should low-power microprocessors that support the encryption of outbound BDOP and the inbound commands to the BMI for different BMI applications be devised?

The field-programmable gate array (FPGA) hardware implementations of cryptographic algorithms allow for the swapping of encryption algorithms in operation, and provide physical security and better performance than software realizations. Alternative architectural requirements for FPGA hardware implementations of RC6, Rijndael, Serpent, and Twofish encryption algorithms exist in the literature [1]. Although the throughput measurements of the implementations of different types of FPGA architectures on encryption algorithms are well known, new metrics are required for profiling the performance of symmetric block ciphers appropriate for BMIs. The authors offer useful metrics for the evaluation of contesting symmetric encryption algorithms suitable for future biomedical implant architectures. They measure the performance of 13 encryption algorithms in simulation experiments, using one and ten kilobyte workloads of blood pressure readouts by a computer program. A microarchitectural simulator capable of modeling and revealing the performance and power, and of exchanging the node capacitance of assorted functional units within the Intel XScale processor, is used to profile the symmetric ciphers.

The authors evaluate the proportional behaviors of different ciphers, in terms of the middling and climax power utilization, overall energy cost, encryption rate and efficiency, encryption program size, and the cipher security level. The Twofish cipher produced steady average and peak power consumption, while IDEA, MISTY1, LOK191, and Rijndael yielded better average power utilization. RC6, IDEA, RC5, MISTY1, and Rijndael were the top competitive energy-efficient ciphers. Unfortunately, only RC6 and RC5 survived the encryption sampling rate of BDOP, although MISTY1, Rijndael, and Blowfish stayed competitive in producing the encryption rate appropriate for BMI devices. Furthermore, the binary size of the executable algorithms of XXTEA, 3WAY, LOK191, RC6, and RC5 required memory favorable to BMI applications. All ciphers investigated, except LOK191 and DES, exhibited the property of infeasibility for a timely successful attack.

The authors convincingly advocate the need to consider the power utilization and speed in the efficient realization of load, store, move, and logic operations for BMI microprocessors. They use graphical and statistical data to highlight the factors that affect the performance of ciphers for BMI applications, but do not address how the various cipher performance metrics should be weighted, in order to objectively target the front-runner cipher. Nevertheless, the paper offers great insights into the performance evaluation of ciphers, relevant to secure data transmission with BMIs.

Reviewer:  Amos Olagunju Review #: CR136133 (0912-1177)
1) Elbirt, A.J.; Yip, W.; Chetwynd, B.; Paar, C. An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists. IEEE Transactions on Very Large Scale Integration (VLSI) Systems 9, 4(2001), 545–557.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Biology And Genetics (J.3 ... )
 
 
Real-Time And Embedded Systems (C.3 ... )
 
 
Standards (E.3 ... )
 
 
Special-Purpose And Application-Based Systems (C.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy