Efficient Design for a Hardware Implementation of the LED Block Cipher

Ayoub Mhaouch, Wajdi Elhamzi, Abdessalem Ben Abdelali, Mohamed Atri

Research output: Contribution to journalArticlepeer-review

4 Scopus citations

Abstract

Recently, most modern cars can be controlled with the Remote Keyless System (RKS). A Remote Keyless System consists of a key fob that communicates wirelessly with the car transceiver that is used to control and secure access to the vehicle. The keyless entry systems are based on RFID communication and are equipped with limited computation and power resources. It was proven to be a target for cybercriminals. In this work, we proposed the use of the LED block cipher for data encryption-decryption of the keyless entry systems. The proposed hardware architecture of the LED algorithm was optimized to fit the limited resources of the keyless entry systems. The proposed 8-bit sequential architecture contains 627 LUTs+FFs. To further reduce hardware resources, we proposed a 4-bit architecture for the MixColumns sub-function, which gives good results in occupying hardware resources by reducing it to 597 LUTs+FFs. This leads to a good effect on the area implementation and power consumption of keyless entry systems. Thus, the proposed LED hardware architecture may be applied to lightweight applications that demand a high level of secrecy such as the key fob. In order to adopt the proposed design of the LED block cipher as a security system for keyless entry systems, we examine the security of the proposed LED architecture using five metrics; entropy analysis, histogram analysis, correlation analysis, NPCR, and UACI. As a result, the LED block cipher has a good ability to encrypt any data against any attack.

Original languageEnglish
Pages (from-to)725-733
Number of pages9
JournalJournal Europeen des Systemes Automatises
Volume56
Issue number5
DOIs
StatePublished - 2023

Keywords

  • LED block cipher
  • hardware implementation
  • high-performance
  • key fob
  • lightweight cryptography
  • low-resource
  • security analysis

Fingerprint

Dive into the research topics of 'Efficient Design for a Hardware Implementation of the LED Block Cipher'. Together they form a unique fingerprint.

Cite this