• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation

    2021-12-11 13:28:56KowsalyaGaneshBabuParameshachariAnandNayyarandRajaMajidMehmood
    Computers Materials&Continua 2021年8期

    T.Kowsalya,R.Ganesh Babu,B.D.Parameshachari,Anand Nayyar and Raja Majid Mehmood

    1Department of Electronic and Communication Engineering,Muthayammal Engineering College,Rasipuram,Namakkal,Tamilnadu,India

    2Department of Electronics and Communication Engineering,SRM TRP Engineering College,Tiruchirappalli,Tamilnadu,India

    3Department of Telecommunication Engineering,GSSS Institute of Engineering and Technology for Women,Mysuru,India

    4Faculty of Information Technology,Graduate School,Duy Tan University,Da Nang,550000,Viet Nam

    5Department of Information and Communication Technology,School of Electrical and Computer Engineering,Xiamen University Malaysia,Sepang,43900,Malaysia

    Abstract:Lightweight Cryptography(LWC)is widely used to provide integrity,secrecy and authentication for the sensitive applications.However,the LWC is vulnerable to various constraints such as high-power consumption,time consumption,and hardware utilization and susceptible to the malicious attackers.In order to overcome this, a lightweight block cipher namely PRESENT architecture is proposed to provide the security against malicious attacks.The True Random Number Generator-Pseudo Random Number Generator(TRNG-PRNG) based key generation is proposed to generate the unpredictable keys, being highly difficult to predict by the hackers.Moreover,the hardware utilization of PRESENT architecture is optimized using the Dual port Read Only Memory (DROM).The proposed PRESENT-TRNGPRNG architecture supports the 64-bit input with 80-bit of key value.The performance of the PRESENT-TRNG-PRNG architecture is evaluated by means of number of slice registers, flip flops, number of slices Look Up Table (LUT), number of logical elements, slices, bonded input/output block (IOB), frequency, power and delay.The input retrieval performances analyzed in this PRESENT-TRNG-PRNG architecture are Peak Signal to Noise Ratio (PSNR), Structural Similarity Index (SSIM) and Mean-Square Error(MSE).The PRESENT-TRNG-PRNG architecture is compared with three different existing PRESENT architectures such as PRESENT On-The-Fly(PERSENT-OTF),PRESENT Self-Test Structure(PRESENT-STS)and PRESENT-Round Keys (PRESENT-RK).The operating frequency of the PRESENT-TRNG-PRNG is 612.208 MHz for Virtex 5, which is high as compared to the PRESENT-RK.

    Keywords: Dual port read only memory; hardware utilization; lightweight cryptography; malicious attackers; present block cipher; pseudo random number generator; true random number generator

    1 Introduction

    Lightweight Cryptography (LWC) plays a vital role to obtain the higher security with low energy and low area in different sensitive applications such as implantable and wearable medical devices, radio-frequency identification tags, Wireless Nano sensors, and smart cards and secure embedded systems [1-3].The symmetric cryptography is divided into two types such as block and stream ciphers.The block cipher processes the one input block at a time and produces the output block for each input block, but the stream cipher frequently processes the input elements and generates the one output element at a time [4,5].FPGA is considered as a growing design platform to implement the cryptographic algorithms because of its in-house security and reconfigurability [6].

    Generally, the Advanced Encryption Standard (AES) is widespread block cipher and fundamental for many security systems [7].But AES used in the high-performance processors is not suitable in resource-constrained platforms because of its inadequate area and energy/power [8].Therefore, the better tradeoff between the security, power, area and speed is obtained by designing the lightweight block cipher [9].Some of the examples of the lightweight ciphers are the STES [10], SEED [11], ANU [12], KLEIN [13], PRESENT [14], and KASUMI [15] and so on.From the different lightweight cipher, PRESENT block cipher is selected as an efficient algorithm due to its hardware efficiency and it also standardized by ISO/IEC 29192-2.However, the hardware failures are considered as the natural fault in the implementation of Very-Large-Scale Integration (VLSI).This natural fault increases the sensitivity and creates the malicious attacks over the cryptographic hardware and embedded systems [16].The conventional LWC method uses the same type of generators and identical keys to accomplish both the encryption and decryption process that leads susceptible to the attacks [17].

    The major contributions of this research paper are given as follows:

    ? The PRESENT architecture improves the robustness against the malicious attackers by random key generation using TRNG-PRNG module and two stage security is used during the encryption process.

    ? In PRESENT architecture, the key value from the TRNG-PRNG module is generated for each clock and plaintext.Therefore, the identification of key value by the unauthenticated users (i.e., malicious attackers) is difficult during the encryption/decryption process.

    ? A DROM is utilized to minimize the number of logical elements used in the PRESENT architecture.The DROM used in the PRESENT architecture accomplishes the operation of Substitution box (S-box).

    The overall organization of the paper is:The literature survey related to existing PRESENT architecture is described in Section 2.The problem statement found from the literature survey along with solution is described in Section 3.Section 4 describes the PRESENT architecture by using key scheduling approach and TRNG-PRNG module.The results and discussion of the PRESENT-TRNG-PRNG architecture is presented in Section 5.Finally, the conclusion is made in Section 6.

    2 Literature Survey

    The literature survey regarding the recent PRESENT block cipher is described along its advantages and limitations in this section.

    Pandey et al.[18] implemented the PRESENT lightweight block cipher algorithm to accomplish the encryption and decryption processes.The developed PRESENT architecture processed 64-bit input value along with the 80/128 bit of key length.Additionally, the dynamic keys were provided with the OTF architecture to compute the intermediate key.Next, the generated intermediate keys were used to accomplish the encryption/decryption operation.The iterative method considered in the decryption is used to achieve the better tradeoff among time and area.The total power consumption of the PRESENT architecture was high at low frequency, when processed with high number of key bits (128 bit).

    De Cnudde et al.[19] developed the evaluation of PRESENT block cipher under two different physical attacks such as Side-Channel Analysis (SCA) and fault attacks (FAs).The first order implementation was used to provide the security against the side-channel.Next, the Private Circuits II is used to provide the security against the FA.The leakage detection test was used to analyze the side channel evaluation.But, the Private Circuits II used for FA resistance in the PRESENT block cipher was expensive.

    Azari et al.[20] implemented the PRESENT Cipher model that incorporated both encryption and decryption process.The encryption and decryption process were accomplished by using 80/128-bit key to obtain the security for 64-bit input value.The plain text of 64 bits processing requires 16 cycles to load the data during encryption process.Here, the PRESENT cipher obtains a higher throughput based on the effective encryption and decryption process.However, the PRESENT cipher used high number of S-boxes which increased the hardware utilization.

    Rashidi [21] presented the two different low-cost and high-throughput block ciphers such as HIGHT and PRESENT to improve the security.Since, the modulo 28 was one of the complex blocks in the HIGHT algorithm.Next, the parallel prefix adders such as Sklansky, Han-Carlson, Kogge-Stone and Ladner-Fischer were used to design the modular adder.Moreover, the PRESENT cipher was supported by two key lengths such as 80-bit and 128-bit.The Karnaugh mapping was used to reduce the amount of logic gates in the S-box and critical path delay.But, the computation time was high and throughput was less when the unroll factor is high in block ciphers.

    Lara-Nino et al.[22] developed the standardized lightweight cipher namely PRESENT to overcome the security issues caused at the extremely constrained environments.Moreover, the data in the registers were moved to the right that used to reduce the MUX size.The PRESENT architecture used two different alternatives to generate the RK of 80 bit and 128 bit.Since, the 80 bit and 128 bit input keys were generated using 20 bit registers and 32 bit registers respectively.The key given to the PRESENT architecture was manually generated by the key generator module and it can be easily predicted by hackers.

    3 Problem Statement

    The problems obtained from the existing literature survey along with the solution by the PRESENT-TRNG-PRNG architecture is as follows.

    The STS based PRESENT architecture requires an additional comparator to generate the output [19].Next, the conventional PRESENT architecture uses high amount of S-box operation to accomplish the encryption process [20].The unroll factor considered in the loop unrolling method also affects the performance of the hardware utilization [21].The aforementioned constraints increase the number of logical elements used in the PRESENT architecture.Since,the increment of hardware utilization leads to affect the operating frequency and power of the overall PRESENT architecture.The manual key generation accomplished in the PRESENT architecture [22] generates the same key value for each clock cycle.The generation of same clock cycle for each round can be easily predicted by the malicious attackers.

    Solution:

    The logical components of PRESENT architecture are minimized by using the DROM.In this PRESENT architecture, 8 DROM is used instead of 16 S-boxes of the conventional PRESENT architecture.The DROM used in the PRESENT-TRNG-PRNG accomplishes the same process which is performed by the S-box.Moreover, the security of the PRESENTTRNG-PRNG architecture is improved by using two different approaches:(1) two stage security approach and (2) unpredictable key generation using TRNG-PRNG module.The robustness of the PRESENT architecture is improved by generating the random key for each clock cycle and each plaintext.

    4 PRESENT-TRNG-PRNG Architecture

    In the PRESENT-TRNG-PRNG architecture, the logical elements are optimized by using the DROM to accomplish the encryption/decryption process.The PRESENT architecture is designed to support the 64-bit input value with 80-bit key length.Here, the random key generation is carried out by using the TRNG-PRNG module.The randomness of the key from the TRNGPRNG module is improved using the two-stage security enabled during encryption process.The block diagram of the PRESENT-TRNG-PRNG architecture is shown in Fig.1.

    Figure 1:Block diagram of the PRESENT-TRNG-PRNG architecture

    The overall working process of the PRESENT-TRNG-PRNG architecture are given as follows:

    1.At first, the input image(P)is read from the MATLAB R2018a software and the image pixels are converted into binary format.

    2.Next, the binary value of the image pixels is written in the text format using MATLAB.

    3.The TRNG-PRNG module is used to generate the random key value to accomplish the encryption operation.The decryption process is generally the inverse process of the encryption operation.

    4.The Verilog (Modelsim) is used to process both the encryption/decryption process.Moreover, the output of encryption and decryption is written in the text format using the Verilog(Modelsim).

    5.Then the text files are used in the MATLAB to convert the encrypted and decrypted binary value into the image.

    4.1 64-Bit Path Encryption

    The overall architecture of the path encryption for 64-bit data is shown in Fig.2.At first, the one pixel from the image is converted into 8 bits and total plain text of 64-bit data(PT)is kept in the register.The plaintext stored in the register is denoted asDreg.On the other hand, the TRNG-PRNG module generates an appropriate key to accomplish the encryption operation over the 64-bit value of plaintext.The conventional PRESENT architecture manually generates the key values which are subjected to predict by the hackers.The main objective of using TRNG-PRNG module in PRESENT architecture is to obtain high security level by generating the random key value for each pixel at every clock cycle.

    Figure 2:Architecture of 64-bit path encryption

    The 80 bit of key value(kdat1)generated from the TRNG-PRNG module is stored in the registerkreg.From the 80 bit ofkdat1, the MSB of 64 bit data(kdat2)is selected and then it is XORed with the 64 bit ofPTvalue as shown in Eq.(1).

    where, thedat1 represents the XOR value between the plaintext and MSB of 64-bit data from the key value generated by TRNG-PRNG module.

    Next, the XORed data is truncated into 16 four bit values which are shown in Eq.(2).

    From the 16 sets of 4-bit values, each 2 sets of 4-bit values are given into the DROM which processes the operation of Substitution box (S-box).For example, thedat1[0:3] anddat1[4:7]are given to the DROM1to process the S-box operation.Totally, there are eight DROMs are used to produce the 64-bit value based on the S-box operation shown in the Tab.1.The conventional PRESENT architecture uses the 16 different S-box operation that leads to increase the hardware utilization and increases the delay while processing the input plain text.Hence, the PRESENTTRNG-PRNG architecture uses only 8 DROMs to process the S-box operation which minimizes the number of logical elements used in the encryption process.The reduction in logical elements minimizes the hardware utilization and increases the speed of the encryption process.

    Table 1:Operation of S-box

    The value obtained from the DROM is represented asSdatwhich is obtained through the Sbox operation.The value from the 8 DROMs are concatenated together and generated one 64-bit value i.e.,dat2 which is shown in the Eq.(3).

    Then the concatenated 64-bit value is processed through the permutation layer (P-layer).This P-layer used to move the bit value in new bit position as shown in the Tab.2.Moreover, the value from the P-layer is represented asdat3 and this updateddat3 is considered instead of plaintext for next 31 rounds.

    Table 2:Operation of P-layer

    On the other hand, the 80-bit key value of processed under the 61 left shift operation as shown in the Eq.(4).

    Next, thekdat2 is divided into four sets such askdat2[79:76],kdat2[75:20],kdat2[19:15],andkdat2[14:0], to obtain the first stage security.The 56-bit and 15-bit of thekdat2[75:20]andkdat2[19:15] are directly taken while updating the key value.Additionally,kdat2[79:20] andkdat2[19:15] are processed through the S-box and add counter to update the key value.The aforementioned steps are illustrated in the following Eq.(5).

    where,RCrepresents the round counter that varies from 0 to 31 for each round.The updated key values such askdat3[79:76],kdat3[75:20],kdat3[19:15] andkdat3[14:0] are concatenated to generate akdat4 which is shown in the Eq.(6).

    This updatedkdat4 is given to the key scheduling process to accomplish the second stage security.Both the first and second stage security are used to improve the randomness of the key values.

    4.2 Key Scheduling Process

    The architecture of key scheduling used in the 64-bit path encryption is shown in Fig.3.This key scheduling is processed for the next 31 rounds to improve the security of the plaintext against malicious attackers.The 80 bit value ofkdat4 is truncated into four 20 bit values such asK1,K2,K3, andK4.Subsequently, these four 20-bit values are processed through the rotation operation in which the bit position is changed as shown in the Tab.3.

    The rotation operation provides four different 20-bit values such asR1,R2,R3, andR4.Next,the truncation operation is processed for each 20-bit value obtained through the rotation.This truncation operation provides five 4-bit values for each 20-bit value.Totally, 20 four-bit values i.e.,{TR1,TR2,...,TR20}are acquired from the four 20-bit value.Moreover, the security is effectively improved by processing the 20 four-bit values through the DROM.Here, each DROM processes two 4-bit value, totally 10 DROMs are utilized in the key scheduling process.The DROM used to perform the operation of the S-box as shown in Tab.1.Finally, the DROM provides 20 four-bit values such as i.e., {Y1,Y2,...,Y20}.ThisY1,Y2,...,Y20 is given to the rotation operation that generates the 80-bit value i.e.,kdat5.

    After completing the 32 rounds, the PRESENT architecture provides the encrypted cipher text that is denoted asCT.Moreover, the decrypted value is obtained based on the inverse process of PRESENT decryption.Here the reverse architecture of PRSENT module is used during the decryption process.The process of key generation using the TRNG-PRNG module is explained in the following section.

    4.3 Key Generation Using TRNG-PRNG Module

    In this TRNG-PRNG module, the key value is generated for each clock cycle as well as for each plain text to improve the security.The overall architecture of 80-bit key generation using TRNG-PRNG module is illustrated in Fig.4.Generally, the TRNG is designed by the digital circuits to produce the true randomness using the unpredictable effects.Here the TRNG is generated by using the $randomfunction.The sequence generated by the TRNG is mainly based on two essential features such as uniformity and statistical independence among the actual symbol and the numbers generated in previous rounds.Moreover, the overall circuit design being used to generate 80-bit key is referred as PRNG.

    Figure 3:Architecture of key sampling process

    Table 3:Operation of rotation

    The steps processed in the key generation using TRNG-PRNG module are given as follows:

    a.Initially, the TRNG-PRNG module generate the 80-bit true random number that is represented asRN0.Next, this 80-bitRN0 value is truncated into four 20 bits such asT1,T2,T3, andT4 which is shown in Eq.(7).

    Figure 4:Architecture of TRNG-PRNG module

    b.The pair of truncated values such asT1 ?T2 andT3 ?T4 is processed under MUX operation.The output from the MUX is operated using the selection line and it is shown in Eq.(8).

    where,M1 andM2 represents the MUX operation value between the pairs ofT1?T2 andT3?T4 respectively.

    c.The values from the MUX processesM1 andM2 are XORed with the 20bit values of theT1 andT4 respectively.The XOR operation between the pairs ofM1?T1 andM2?T4 are denoted asX1 andX2 respectively as shown in Eq.(9).For example, the XOR operation between theM1 ?T1 pair is shown in Tab.4.

    Table 4:Sample XOR operation for M1 ?T1

    d.In this key generation process, one more TRNG is used to generate four 20-bit values such asRN1,RN2,RN3, andRN4.This structure uses 4 different adders to sum the different pair values such asX1?RN1,M1?RN2,X2?RN3 andM2?RN4 as shown in Eq.(10).

    where,A1,A2,A3, andA4 are the values obtained through the addition process.

    e.The values ofA1 ?A2 andA3 ?A4 are processed under XNOR operation, once the addition is completed.Eq.(11) shows the process of XNOR operation and sample XNOR operation between the pair ofA1 ?A2 is shown in Tab.5.

    where,X3 andX4 are the XNOR values between theA1 ?A2 andA3 ?A4 pair respectively.

    Table 5:Sample XNOR operation for A1 ?A2

    f.One more MUX operation is carried out using 4 different inputs such asA1,X3,A4, andX4.The output(M3)from the MUX operation is mainly defined based on the counter value.For instance, the MUX givesA1 as output when the counter value is 0.Similarly,the MUX provides the output ofX3,A4 andX4, when the counter value is 1, 2 and 3 respectively.

    g.Finally, the concatenation operation between theX3,M3,X4 andA4 is carried out to generate the 80 bit key value i.e.,kdat1=X3||M3||X4||A4.Thiskdat1 of 80-bit value from the TRNG-PRNG module is given as input to the encryption process.

    The optimization of hardware components using DROM leads to obtain the high operating frequency and less area utilization while designing the PRESENT architecture.Moreover, the generation of key for each round and each plaintext improves the robustness of the encrypted cipher text against attackers.Therefore, it is difficult to predict the original plain text without knowing key value generated from the TRNG-PRNG module.

    5 Results and Discussion

    The results and discussion of the TRNG-PRNG based PRESENT architecture is described in this section.The implementation of the PRESENT architecture along with key generation module i.e., TRNG-PRNG module is carried out using the Xilinx ISE 14.2 software.This TRNG-PRNG based PRESENT architecture is designed using the very high speed integrated circuit hardware description language and ModelSim simulator is used to perform the functional simulations.Moreover, the MATLAB R2018a software is used to convert the image file into txt file.In PRESENT architecture, the TRNG-PRNG module is used to generate the key to accomplish the encryption/decryption process.The developed PRESENT architecture supports the 80-bit key value for 64-bit input.

    5.1 Performance Analysis of PRESENT-TRNG-PRNG Architecture for Different FPGA Devices

    The PRESENT-TRNG-PRNG architecture is developed for 64-bit path encryption using the 80-bit key value.The 64-bit path encryption using PRESENT-TRNG-PRNG architecture is analyzed in six different Xilinx FPGA devices such as Spartan 6, Virtex 4, and Virtex 5.The sample input image considered for 64-bit path encryption is “monarch.png” highlighted in Fig.5.Next, this sample image is converted as gray scale image and it is converted into 128×128 as shown in Fig.6.The input image sizes are decided by the user and it is not stable.

    Figure 5:Input image

    Figure 6:Gray image

    Figure 7:Binary format of gray scale image

    The gray scale input image shown in the Fig.6 contains totally 16384 pixels.Additionally, the gray scale image is converted into binary format using thedec2binfunction.The binary format of the image is shown in Fig.7 and this binary value is stored in the memory of the FPGA processor.The histogram of the input image obtained usingimhistfunction is shown in the Fig.8.Next, the binary values of the sample image are divided into 64-bits and it is given as input to the encryption process.On the other hand, the TRNG-PRNG module generates the efficient key value of 80-bit that used to encrypt the input plain text.

    Figure 8:Histogram for input image

    Fig.9 shows the simulation waveform obtained from the ModelSim simulator.The control signals given to the PRESENT-TRNG-PRNG architecture areclkandload.Theidatandodatin Fig.9 represents the input data(PT)and cipher text(CT).Here, the input data(PT)is given to encryption and cipher text (CT) is obtained from the encryption operation.Thekeyrepresents the 80-bit key value generated using TRNG-PRNG module.kreganddregare the registers used to store the input plaintext and key value from the TRNG-PRNG module respectively.Next,dat1,dat2,dat3 andkdat1,kdat2 are the intermediate variables of plaintext and key value that process 64-bit path encryption.Further, theroundrepresents the number of rounds processed during the encryption process.Fig.9 highlights that the encryption PRESENT-TRNG-PRNG architecture satisfies the test vector.For example, the output cipher text (i.e., 5579C1387B228445)marked by the red box in the Fig.9 is equal to the cipher text given in the test vector.From the test vector analysis, it is proved that the PRESENT-TRNG-PRNG architecture works precisely during encryption.This test vector is verified for the PRESENT architecture except the 2nd stage key scheduling security.

    The hardware utilization, power, delay, and frequency for the different FPGA architectures are illustrated as follows:

    The hardware utilization of the PRESENT-TRNG-PRNG architecture for Spartan 6 is shown in the Tab.6.The results shown from Tab.6 is taken for the 64-bit path encryption using 80-bit key value.The LUT, slices and flip flops for the Spartan 6 device are 45, 35 and 48 respectively.From hardware analysis, the amount of LUT used by the Spartan 6 is less as compared to the remaining five FPGA devices.If the PRESENT-TRNG-PRNG architecture is implemented in the hardware Spartan 6, the encryption output is easily verified by using the 16-output light emitting diodes present in the Spartan 6 FPGA device.The utilization of 8 DROMs instead of 16 Sboxes in PRESENT architecture helps to minimize the hardware utilization.Moreover, the analysis of frequency, delay and power are shown in the Tab.7.These performances are evaluated for different FPGA devices.Tab.7 shows that the PRESENT-TRNG-PRNG architecture using Virtex 5 FPGA device provides higher frequency i.e., 612.208 MHz when compared to the remaining FPGA devices.The frequency of the PRESENT architecture with Virtex 5 device increase due to the less amount of hardware utilization.

    Figure 9:Simulation waveform

    Table 6:Hardware utilization of PRESENT-TRNG-PRNG architecture in spartan 6 FPGA

    Table 7:Analysis of frequency, delay and power for different FPGA devices

    The encrypted binary value of input image pixel is transferred to the MATLAB R2018a software.The encrypted image using PRESENT-TRNG-PRNG architecture and its histogram count are shown in the Figs.10 and 12, respectively.Similarly, the decrypted image and its histogram count are shown in the Figs.11 and 13 respectively.The amount of error occurred between the input sample image to the decrypted sample are calculated using the histogram count.Moreover, the image retrieval performance of the PRESENT-TRNG-PRNG architecture are analyzed using the MSE, PSNR and SSIM.The PRESENT-TRNG-PRNG architecture obtains significant PSNR and SSIM of 49.8762 dB and 0.8211 respectively.Hence, the PRESENT-TRNG-PRNG architecture preserves the details in the image during the encryption/decryption process.

    Figure 10:Encrypted image

    Figure 11:Decrypted image

    Figure 12:Histogram for encrypted image

    Figure 13:Histogram for decrypted image

    5.2 Comparative Analysis

    The effectiveness of the PRESENT-TRNG-PRNG architecture is evaluated by comparing with three existing PRESENT architecture designs.The existing methods used for the performance evaluation are PRESENT-OTF [18], PRESENT-STS [19] and PRESENT-RK [22].The comparative analysis is accomplished by using five different FPGA devices such as Spartan 3, Spartan 6,Virtex 4, Virtex 5 and Kintex 7.

    Tabs.8 and 9 shows the comparison of the PRESENT-TRNG-PRNG architecture with the PRESENT-OTF [18], and PRESENT-RK [22] respectively.The comparison shows that the PRESENT-TRNG-PRNG architecture utilizes less amount of hardware components when compared to the PRESENT-OTF [18], and PRESENT-RK [22].The PRESENT-STS [19] is used for high amount of S-box operation (e.g., 16 S-boxes) during encryption/decryption as well as this PRESENT-STS [19] requires additional comparator to generate the output that leads to increase the hardware utilization.But, the PRESENT-TRNG-PRNG uses only 8 DROM to accomplish the operation of the S-box.The DROM is used in both the encryption and key scheduling process that minimizes the overall hardware utilization.Moreover, the manual key generation of the PRESENT-RK [22] is vulnerable to the malicious attackers because the manually generated keys in PRESENT-RK [22] can be easily detected by the attackers.The two-stage security in the 64-bit path encryption and random key generation using TRNG-PRNG module increases the security against the malicious attackers.

    Table 8:Comparison of PRESENT-TRNG-PRNG with PRESENT-OTF

    Table 9:Comparison of PRESENT-TRNG-PRNG with PRESENT-RK

    6 Conclusion

    In this paper, the TRNG-PRNG module based key generation is accomplished in PRESENT architecture to generate the 80-bit key value to support the 64-bit of input value.Additionally,the randomness of the key obtained from the TRNG-PRNG module is increased using the two stage security during the 64-bit path encryption.Therefore, the key value used in the PRESENTTRNG-PRNG architecture is unpredictable by the malicious attackers which improves the security of the input value.Moreover, the hardware utilization of the PRESENT architecture is minimized using the DROM to process the operation of S-box.Hence, the PRESENT-TRNG-PRNG architecture minimizes the logical elements while maintaining the higher security.The PRESENTTRNG-PRNG architecture provides better performance when compared to the PRESENT-OTF,PRESENT-STS and PRESENT-RK.The operating frequency of the PRESENT-TRNG-PRNG is 612.208 MHz for Virtex 5, it is high when compared to the PRESENT-RK.In future, the architecture level optimization can be implemented as well as the hardware utilization and power consumption will be reduced for the entire PRESENT architecture.

    Funding Statement:This research was supported by the Xiamen University Malaysia Research Fund (XMUMRF) (Grant No:XMUMRF/2019-C3/IECE/0007).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    国产国拍精品亚洲av在线观看| 成人免费观看视频高清| 国产亚洲欧美精品永久| 麻豆成人av视频| 亚洲精品成人av观看孕妇| 日韩欧美精品免费久久| 久久6这里有精品| 国产视频首页在线观看| 自拍欧美九色日韩亚洲蝌蚪91 | 97超碰精品成人国产| 欧美极品一区二区三区四区| 少妇人妻精品综合一区二区| 欧美日韩视频高清一区二区三区二| 久久精品久久久久久噜噜老黄| 黄片wwwwww| 国产av码专区亚洲av| 国产男女超爽视频在线观看| 国产高清不卡午夜福利| 久久精品国产亚洲av涩爱| 蜜桃亚洲精品一区二区三区| 天堂俺去俺来也www色官网| 日韩免费高清中文字幕av| 黄色怎么调成土黄色| 男女国产视频网站| 青春草亚洲视频在线观看| 一边亲一边摸免费视频| 国产精品福利在线免费观看| 日日啪夜夜撸| 亚洲精品乱码久久久久久按摩| 91久久精品电影网| 午夜福利在线观看免费完整高清在| 成人免费观看视频高清| 国产精品一区二区三区四区免费观看| 亚洲国产精品999| 免费少妇av软件| 另类亚洲欧美激情| 国产精品国产av在线观看| 狠狠精品人妻久久久久久综合| 色视频www国产| 国产精品一二三区在线看| 亚洲成人一二三区av| 久久人人爽人人片av| 麻豆乱淫一区二区| 国产精品伦人一区二区| 亚洲av在线观看美女高潮| 亚洲精品一区蜜桃| 在线观看一区二区三区激情| 欧美 日韩 精品 国产| 亚洲人成网站在线播| 妹子高潮喷水视频| 午夜精品国产一区二区电影| 精品99又大又爽又粗少妇毛片| 极品教师在线视频| 久久精品久久久久久久性| 国产老妇伦熟女老妇高清| 97热精品久久久久久| 美女福利国产在线 | 亚洲va在线va天堂va国产| 亚洲,一卡二卡三卡| 日韩强制内射视频| 国产亚洲欧美精品永久| 在线观看三级黄色| 欧美精品亚洲一区二区| 久久国产亚洲av麻豆专区| 久久久久人妻精品一区果冻| 丰满乱子伦码专区| 国产精品三级大全| 亚洲美女视频黄频| 精品久久久久久电影网| 久久99蜜桃精品久久| 三级国产精品欧美在线观看| 久久久久久久久久久免费av| 波野结衣二区三区在线| 国产欧美亚洲国产| 干丝袜人妻中文字幕| 天天躁日日操中文字幕| 精品久久久久久电影网| 观看av在线不卡| 国产一区二区在线观看日韩| 看非洲黑人一级黄片| 日韩人妻高清精品专区| 男的添女的下面高潮视频| 国产免费福利视频在线观看| 91久久精品电影网| 亚洲真实伦在线观看| 亚洲真实伦在线观看| 国产一区二区三区av在线| 九九久久精品国产亚洲av麻豆| 国产精品一及| 日日啪夜夜撸| 亚洲精品,欧美精品| 欧美精品一区二区免费开放| 日本av免费视频播放| 哪个播放器可以免费观看大片| 国产午夜精品久久久久久一区二区三区| 三级国产精品欧美在线观看| 国产永久视频网站| 高清午夜精品一区二区三区| 国产有黄有色有爽视频| 亚洲av欧美aⅴ国产| 久久久久久九九精品二区国产| 国产爱豆传媒在线观看| 亚洲精品视频女| 国产一区二区三区av在线| 最黄视频免费看| 亚洲国产av新网站| 欧美日韩精品成人综合77777| 亚洲熟女精品中文字幕| 亚洲怡红院男人天堂| 成人国产av品久久久| 欧美日韩在线观看h| www.av在线官网国产| 色网站视频免费| 全区人妻精品视频| 成年美女黄网站色视频大全免费 | 一区二区三区四区激情视频| 精品久久久久久久久av| 亚洲精品乱久久久久久| 国产一区亚洲一区在线观看| 多毛熟女@视频| 国产精品一区二区在线不卡| 久久精品久久精品一区二区三区| 日韩成人av中文字幕在线观看| 成人漫画全彩无遮挡| 国产高清国产精品国产三级 | 亚洲国产精品国产精品| 成人美女网站在线观看视频| 久久国产精品男人的天堂亚洲 | 欧美日韩国产mv在线观看视频 | 中文字幕亚洲精品专区| 在线观看一区二区三区激情| 国产黄频视频在线观看| 97超碰精品成人国产| 国产精品一区二区在线不卡| 亚洲av福利一区| 精品一区在线观看国产| 舔av片在线| 亚洲成人手机| 熟女人妻精品中文字幕| 人妻系列 视频| 久久久久性生活片| 国产深夜福利视频在线观看| 黄色欧美视频在线观看| 大香蕉久久网| 国产黄片美女视频| 日本-黄色视频高清免费观看| 肉色欧美久久久久久久蜜桃| 亚洲av中文av极速乱| 亚洲欧美成人精品一区二区| 免费少妇av软件| 亚洲国产精品999| 免费观看av网站的网址| 人妻夜夜爽99麻豆av| 自拍偷自拍亚洲精品老妇| 最黄视频免费看| 在线观看三级黄色| 97在线视频观看| 亚洲欧美日韩卡通动漫| 日韩免费高清中文字幕av| 乱系列少妇在线播放| 美女视频免费永久观看网站| 亚洲国产毛片av蜜桃av| 人妻 亚洲 视频| 欧美人与善性xxx| 久久女婷五月综合色啪小说| 天堂中文最新版在线下载| 蜜臀久久99精品久久宅男| 亚洲伊人久久精品综合| 高清av免费在线| 嫩草影院新地址| 国产淫片久久久久久久久| 久热久热在线精品观看| 亚洲三级黄色毛片| 在线精品无人区一区二区三 | 一级二级三级毛片免费看| 99久久精品国产国产毛片| 久久国内精品自在自线图片| 少妇猛男粗大的猛烈进出视频| 亚洲综合精品二区| 韩国av在线不卡| 性色avwww在线观看| 狂野欧美白嫩少妇大欣赏| 久久久久久久大尺度免费视频| 在线观看一区二区三区激情| 日韩一区二区视频免费看| 国产精品99久久久久久久久| 女人久久www免费人成看片| 日韩av不卡免费在线播放| 免费观看a级毛片全部| 亚洲av成人精品一二三区| 多毛熟女@视频| 天天躁日日操中文字幕| 熟女人妻精品中文字幕| 高清毛片免费看| 秋霞伦理黄片| 黄色配什么色好看| 国产熟女欧美一区二区| 亚洲精品久久久久久婷婷小说| 免费播放大片免费观看视频在线观看| 在线观看三级黄色| 久久精品久久精品一区二区三区| 性色avwww在线观看| 日韩一区二区三区影片| av在线app专区| av视频免费观看在线观看| .国产精品久久| 两个人的视频大全免费| 国产真实伦视频高清在线观看| 大片电影免费在线观看免费| 欧美性感艳星| a 毛片基地| 特大巨黑吊av在线直播| 在线观看免费视频网站a站| 色综合色国产| 日韩人妻高清精品专区| 草草在线视频免费看| 多毛熟女@视频| 欧美xxxx黑人xx丫x性爽| 久久精品久久久久久久性| 中文字幕人妻熟人妻熟丝袜美| 在线精品无人区一区二区三 | 国产亚洲最大av| 嫩草影院新地址| 最近的中文字幕免费完整| 97在线人人人人妻| 成年女人在线观看亚洲视频| 久久精品国产亚洲av涩爱| 午夜福利高清视频| 国产精品秋霞免费鲁丝片| 久久99热这里只频精品6学生| 高清欧美精品videossex| 日本黄色片子视频| 久久国产精品男人的天堂亚洲 | 国产午夜精品一二区理论片| 久久鲁丝午夜福利片| 国产精品一区二区性色av| 一区在线观看完整版| 男女边吃奶边做爰视频| 久久97久久精品| 色婷婷久久久亚洲欧美| 国产精品麻豆人妻色哟哟久久| 女性生殖器流出的白浆| 只有这里有精品99| 久久久久久伊人网av| 狂野欧美激情性xxxx在线观看| 国产亚洲精品久久久com| 免费黄网站久久成人精品| 久久亚洲国产成人精品v| 国产精品久久久久久久电影| av播播在线观看一区| 精品一区在线观看国产| 丝袜脚勾引网站| 丝袜喷水一区| 亚洲经典国产精华液单| 汤姆久久久久久久影院中文字幕| 国产国拍精品亚洲av在线观看| 亚洲欧美日韩卡通动漫| 另类亚洲欧美激情| 欧美人与善性xxx| 在线观看av片永久免费下载| 国产成人91sexporn| 亚洲aⅴ乱码一区二区在线播放| 国产精品伦人一区二区| 人妻 亚洲 视频| 日本-黄色视频高清免费观看| 久久精品国产自在天天线| a级毛片免费高清观看在线播放| 日韩欧美精品免费久久| 国产欧美日韩一区二区三区在线 | 少妇人妻一区二区三区视频| 一边亲一边摸免费视频| 18禁在线无遮挡免费观看视频| 日韩亚洲欧美综合| 极品少妇高潮喷水抽搐| 五月开心婷婷网| 最黄视频免费看| 亚洲国产精品一区三区| 水蜜桃什么品种好| 男人添女人高潮全过程视频| 欧美日韩一区二区视频在线观看视频在线| 少妇人妻一区二区三区视频| 久久综合国产亚洲精品| 在现免费观看毛片| 成年av动漫网址| 麻豆成人av视频| 日本午夜av视频| 激情五月婷婷亚洲| 高清欧美精品videossex| 亚洲精品国产av蜜桃| 日本黄色日本黄色录像| 免费人妻精品一区二区三区视频| 九色成人免费人妻av| 国产老妇伦熟女老妇高清| 国产一区有黄有色的免费视频| 人体艺术视频欧美日本| 久久久久久久久大av| 国语对白做爰xxxⅹ性视频网站| 蜜桃久久精品国产亚洲av| 伦精品一区二区三区| 亚洲av中文av极速乱| 成人影院久久| 熟女人妻精品中文字幕| 久久这里有精品视频免费| 欧美精品一区二区大全| 国产成人精品婷婷| 2021少妇久久久久久久久久久| 极品少妇高潮喷水抽搐| .国产精品久久| 七月丁香在线播放| 国产在视频线精品| 又爽又黄a免费视频| 亚洲av二区三区四区| 少妇被粗大猛烈的视频| 免费大片18禁| 韩国av在线不卡| 亚洲无线观看免费| 欧美精品一区二区免费开放| 91久久精品国产一区二区三区| 在线免费十八禁| 青春草视频在线免费观看| 欧美精品人与动牲交sv欧美| 少妇的逼好多水| 在线免费十八禁| av视频免费观看在线观看| 久久久久久九九精品二区国产| 国产亚洲午夜精品一区二区久久| 国产美女午夜福利| 日韩在线高清观看一区二区三区| 亚洲av国产av综合av卡| 成人影院久久| 性色av一级| 人人妻人人爽人人添夜夜欢视频 | 一个人免费看片子| 纵有疾风起免费观看全集完整版| 国产高清国产精品国产三级 | 久久久亚洲精品成人影院| 夫妻午夜视频| 男人和女人高潮做爰伦理| av专区在线播放| 在线看a的网站| 国国产精品蜜臀av免费| 久久久久国产精品人妻一区二区| 亚洲无线观看免费| 中文欧美无线码| 观看美女的网站| 国产精品伦人一区二区| 国产成人精品福利久久| 成人国产麻豆网| 国产在视频线精品| 人妻 亚洲 视频| 日本av免费视频播放| 天美传媒精品一区二区| 成年av动漫网址| 国产熟女欧美一区二区| xxx大片免费视频| 日韩 亚洲 欧美在线| 高清视频免费观看一区二区| 观看av在线不卡| 婷婷色综合www| 99久久精品一区二区三区| 婷婷色麻豆天堂久久| 综合色丁香网| 极品教师在线视频| 欧美日韩综合久久久久久| 18禁裸乳无遮挡动漫免费视频| 亚洲欧美一区二区三区国产| 亚洲,欧美,日韩| 男女下面进入的视频免费午夜| 国模一区二区三区四区视频| 国产淫语在线视频| 亚洲激情五月婷婷啪啪| 18禁在线播放成人免费| 欧美日韩亚洲高清精品| av福利片在线观看| 国产男人的电影天堂91| 在现免费观看毛片| 国产精品人妻久久久久久| 黄片wwwwww| 春色校园在线视频观看| 男女无遮挡免费网站观看| 亚洲真实伦在线观看| av国产精品久久久久影院| 少妇精品久久久久久久| 亚洲精品自拍成人| 天堂8中文在线网| 午夜福利高清视频| 大片电影免费在线观看免费| 久久精品国产亚洲网站| 欧美激情国产日韩精品一区| 一区二区av电影网| 国语对白做爰xxxⅹ性视频网站| 美女中出高潮动态图| 日日啪夜夜撸| 国产成人a∨麻豆精品| 亚洲三级黄色毛片| 亚洲精品日韩av片在线观看| 午夜老司机福利剧场| 国产av一区二区精品久久 | 青春草亚洲视频在线观看| 欧美高清性xxxxhd video| 精品熟女少妇av免费看| 青春草亚洲视频在线观看| 成年av动漫网址| 两个人的视频大全免费| 午夜免费鲁丝| 国产深夜福利视频在线观看| 人妻夜夜爽99麻豆av| 久久久久性生活片| 国产国拍精品亚洲av在线观看| 妹子高潮喷水视频| 色哟哟·www| 精品久久久久久久末码| 中文在线观看免费www的网站| 亚洲精华国产精华液的使用体验| 午夜日本视频在线| 日本av手机在线免费观看| 亚洲人成网站在线播| 国产黄片美女视频| 午夜激情久久久久久久| 国产片特级美女逼逼视频| 又黄又爽又刺激的免费视频.| 纵有疾风起免费观看全集完整版| 欧美另类一区| 午夜激情福利司机影院| 另类亚洲欧美激情| 午夜日本视频在线| 能在线免费看毛片的网站| 国产成人a区在线观看| 日韩人妻高清精品专区| 午夜福利视频精品| 精品久久久噜噜| 日本色播在线视频| 日日摸夜夜添夜夜爱| 99热这里只有是精品50| 午夜福利在线在线| 卡戴珊不雅视频在线播放| 最近最新中文字幕大全电影3| 色网站视频免费| 亚洲国产欧美人成| 国产精品久久久久久精品古装| 黄色配什么色好看| 我的女老师完整版在线观看| 成人二区视频| 久久久久久九九精品二区国产| 亚洲综合精品二区| 久久毛片免费看一区二区三区| 欧美xxⅹ黑人| 国产综合精华液| 蜜桃亚洲精品一区二区三区| 中文在线观看免费www的网站| 欧美三级亚洲精品| 国产精品一及| 国产精品99久久99久久久不卡 | 天堂8中文在线网| 国产成人精品一,二区| 国产真实伦视频高清在线观看| 我要看黄色一级片免费的| 亚洲av福利一区| 在线免费十八禁| 国产成人一区二区在线| 又大又黄又爽视频免费| 色婷婷久久久亚洲欧美| 亚洲性久久影院| 亚洲av福利一区| 国产亚洲一区二区精品| 成人亚洲欧美一区二区av| 欧美少妇被猛烈插入视频| 极品教师在线视频| 国产女主播在线喷水免费视频网站| 免费av中文字幕在线| 欧美高清性xxxxhd video| 欧美区成人在线视频| 丰满迷人的少妇在线观看| 新久久久久国产一级毛片| 亚洲精品视频女| 国产精品久久久久久av不卡| 人人妻人人看人人澡| 少妇人妻 视频| 水蜜桃什么品种好| 日韩,欧美,国产一区二区三区| 18禁裸乳无遮挡动漫免费视频| 特大巨黑吊av在线直播| 91久久精品电影网| 天堂8中文在线网| av在线老鸭窝| 国产精品无大码| 亚洲精品日本国产第一区| 岛国毛片在线播放| 久久久国产一区二区| 久久久久久久大尺度免费视频| 1000部很黄的大片| 嫩草影院新地址| 精品视频人人做人人爽| 精品久久久久久久久亚洲| 日本欧美国产在线视频| 99国产精品免费福利视频| 最近最新中文字幕免费大全7| 少妇人妻精品综合一区二区| 女性被躁到高潮视频| 亚洲无线观看免费| 日韩大片免费观看网站| 国产精品久久久久久精品古装| 在线看a的网站| 亚洲色图综合在线观看| 日韩一区二区视频免费看| 美女国产视频在线观看| 欧美 日韩 精品 国产| 日韩av在线免费看完整版不卡| 一级毛片我不卡| 色5月婷婷丁香| 少妇人妻久久综合中文| 纯流量卡能插随身wifi吗| 国产亚洲5aaaaa淫片| 国产片特级美女逼逼视频| 久久人妻熟女aⅴ| 成人无遮挡网站| av福利片在线观看| 91精品国产国语对白视频| 人妻制服诱惑在线中文字幕| av国产精品久久久久影院| 久久久久久久久久久免费av| 一二三四中文在线观看免费高清| 亚洲国产精品999| 日韩强制内射视频| 直男gayav资源| 免费人妻精品一区二区三区视频| 最近手机中文字幕大全| 欧美区成人在线视频| 毛片女人毛片| 国产成人一区二区在线| 自拍欧美九色日韩亚洲蝌蚪91 | 国产 精品1| 久久久久久久久久久免费av| 免费av中文字幕在线| 国产在线一区二区三区精| 成人毛片a级毛片在线播放| 国精品久久久久久国模美| 日韩电影二区| av国产免费在线观看| 最近手机中文字幕大全| 中文资源天堂在线| xxx大片免费视频| 免费看日本二区| 亚洲欧美精品自产自拍| 噜噜噜噜噜久久久久久91| 高清毛片免费看| 交换朋友夫妻互换小说| 国产黄片视频在线免费观看| 中文字幕久久专区| 免费观看a级毛片全部| 我要看黄色一级片免费的| 不卡视频在线观看欧美| 精品久久久久久电影网| a 毛片基地| www.av在线官网国产| 2018国产大陆天天弄谢| 香蕉精品网在线| 在线看a的网站| 国精品久久久久久国模美| 在线观看一区二区三区激情| 精品人妻视频免费看| 亚洲四区av| 少妇高潮的动态图| 国产免费一区二区三区四区乱码| 欧美三级亚洲精品| 熟女人妻精品中文字幕| 亚洲精品亚洲一区二区| 久久精品国产亚洲网站| 日韩av在线免费看完整版不卡| 妹子高潮喷水视频| 一区在线观看完整版| 精品亚洲乱码少妇综合久久| 免费不卡的大黄色大毛片视频在线观看| 久久国产精品男人的天堂亚洲 | 欧美性感艳星| 欧美人与善性xxx| 久久久久人妻精品一区果冻| 又黄又爽又刺激的免费视频.| 一区二区av电影网| 亚洲av在线观看美女高潮| 精品一区二区免费观看| 久久久a久久爽久久v久久| 国产精品av视频在线免费观看| 蜜桃久久精品国产亚洲av| 汤姆久久久久久久影院中文字幕| 久久99热6这里只有精品| 国产午夜精品久久久久久一区二区三区| 在现免费观看毛片| 插逼视频在线观看| 观看美女的网站| 人妻 亚洲 视频| 国产精品一及| 国产成人a区在线观看| 免费久久久久久久精品成人欧美视频 | 人人妻人人爽人人添夜夜欢视频 | 精品人妻偷拍中文字幕| 亚洲av免费高清在线观看| 欧美区成人在线视频| 男人爽女人下面视频在线观看| 两个人的视频大全免费| 狂野欧美白嫩少妇大欣赏| 日韩av在线免费看完整版不卡| 99热6这里只有精品| 国产黄频视频在线观看| 国产欧美日韩一区二区三区在线 | 大又大粗又爽又黄少妇毛片口| 国产男女内射视频| 国产精品不卡视频一区二区| 天堂8中文在线网| 伦理电影大哥的女人| 18禁在线无遮挡免费观看视频| 欧美三级亚洲精品| 熟女人妻精品中文字幕| 亚洲熟女精品中文字幕| videos熟女内射|