Problems of AES encryption without hardware acceleration on BROADCOM BCM2711chips

DOI: 10.31673/2412-9070.2023.034050

  • Бараннік О. І. (Barannik O. I.) State University of Information and Communication Technologies, Kyiv

Abstract

In today’s world, information security plays a critical role in various aspects of our lives. Over the past decade, data encryption has become the primary means of ensuring confidentiality, integrity, and availability of information. Using modern encryption algorithms, we can protect our data from unauthorized access and malicious use. With the development of technology, single-board computers are becoming more popular and functional. The use of single-board computers can significantly increase the functionality of UAVs. For example, using a single-board computer with real-time video processing capabilities can enable UAVs to perform tasks such as monitoring territories, tracking objects, or even performing search and rescue operations. However, devices such as unmanned aerial vehicles (UAVs), which require high data processing speeds and low energy consumption, are often limited by the lack of hardware acceleration for encryption algorithms such as AES [1]. This leads to a sharp decrease in encryption and decryption speeds. Such a limitation requires us to search for effective alternatives to the AES algorithm for such devices. Considering these limitations and the need for alternatives, the purpose of this article is to compare the performance of different encryption algorithms on the Broadcom BCM2711, Quad core Cortex-A72 (ARM v8) 64-bit SoC [2]. We analyze the encryption and decryption speeds for AES-256, AES-512, ChaCha12, and ChaCha20 algorithms. This will allow us to understand which algorithm is most effective for use in UAV control systems and other devices built on Bcm2711 that do not have AES hardware acceleration. I hope that this analysis will help developers and engineers choose the optimal encryption algorithm for their systems, considering factors such as speed, security, and hardware limitations.

Keywords: encryption; decryption; UAVs; Raspberry Pi 4; AES; ChaCha20; hardware acceleration; ChaCha12; algorithmic efficiency; single-board computers; wireless communications.

References
1. Forum Raspberry Pi. BCM2837B0 and ARMv8 Crypto Extensions [Електронний ресурс]. URL: https://forums.raspberrypi.com//viewtopic.php?f=63&t=207888
2. Datasheet BCM2711 [Електронний ресурс]. URL: https://datasheets.raspberrypi.com/bcm2711/bcm2711-peripherals.pdf
3. What Is Data Encryption: Types, Algorithms, Techniques and Methods [Електронний ресурс]. URL: https://www.simplilearn.com/data-encryptionmethods-article
4. CSO. Equifax data breach FAQ: What happened, who was affected, what was the impact? [Електронний ресурс]. URL: ttps://www.csoonline.com/article/567833/equifax-data-breach-faq-what-happened-who-was-affected-what-was-the-impact.html
5. Fotis. Case study: Facebook–Cambridge Analytica data breach scandal. [Електронний ресурс] URL: https://fotislaw.com/lawtify/case-study-on-facebooks-data-breach/
6. Springer Link. Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha [Електронний ресурс]. URL: https://link.springer.com/chap - ter/10.1007/978-3-642-37682-5_24

Section
Articles