Design of Memristive Lightweight Encryption For In-Memory Image Steganography
Seyed Erfan Fatemieh, Reza Shahdi Alizadeh, Esmail Zarezadeh
TLDR
This paper designs memristive lightweight encryption for in-memory image steganography, addressing data transfer bottlenecks and enhancing security.
Key contributions
- Uses memristive Computation In-Memory-Array (CIM-A) for secure and efficient data processing.
- Implements Trivium and Grain-128a lightweight ciphers with stateful IMPLY logic.
- Proposes efficient data-shifting for shift registers, reducing steps & energy by up to 44%.
- Evaluated the proposed circuits' efficiency in an image steganography application.
Why it matters
Data-intensive applications face challenges with energy consumption and performance due to data transfer. This paper offers a solution by integrating lightweight cryptography with memristive CIM-A architectures, ensuring data security and reducing energy use. It provides an efficient way to secure data in memory, crucial for hardware-constrained devices.
Original Abstract
With the expansion of data-intensive applications and increasing data volumes, providing an efficient solution to address growing energy consumption and performance degradation caused by the transfer of large amounts of data between the processor and the main memory has become a severe challenge. The frequent transfer of large amounts of data between internal chip units, memories, and their interconnections exacerbates the vulnerability of the data being accessed. Employing a memristive Computation In-Memory-Array (CIM-A) architecture limits data transfer, thereby addressing both challenges. Furthermore, by integrating lightweight cryptography, developed to secure data in hardware-constrained devices, with CIM-A architectures, the security of data in transit, especially across interconnections, can be ensured. This paper implements two standard lightweight stream ciphers, Trivium and Grain-128a, for CIM using stateful material implication (IMPLY) logic to address these combined security and performance challenges. In addition to redesigning the cryptographic structures, we reduce the hardware complexity of conventional IMPLY-based implementations by proposing an efficient method for shifting data within the shift registers. Applying the proposed data-shifting method to the registers of these ciphers reduces the number of computational steps and decreases energy consumption by up to 42% and 44%, respectively, compared to conventional implementations. Finally, the performance of the proposed circuits is evaluated in a steganography application, demonstrating their practical efficiency.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.