Reconfigured CoARX architecture for implementing ARX hashing in microcontrollers of IoT systems with limited resources
Article Sidebar
Open full text
Issue Vol. 15 No. 4 (2025)
-
Control of the magnetic levitation using a PID controller with adaptation based on linear interpolation logic and genetic algorithm
Dominik Fila, Andrzej Neumann, Bartosz Olesik, Jakub Pawelec, Kamil Przybylak, Mateusz Ungier, Dawid Wajnert5-9
-
Development of a system for predicting failures of bagging machines
Nataliia Huliieva, Nataliia Lishchyna, Viktoriya Pasternak, Zemfira Huliieva10-13
-
Development and verification of a modular object-oriented fuzzy logic controller architecture for customizable and embedded applications
Rahim Mammadzada14-24
-
Mechanical fracture energy and structural-mechanical properties of meat snacks with beekeeping additives
Artem Antoniv, Igor Palamarchuk, Leonora Adamchuk, Marija Zheplinska25-31
-
Modelling of dynamic processes in a nonholonomic system in the form of Gibbs-Appell equations on the example of a ball mill
Volodymyr Shatokhin, Yaroslav Ivanchuk, Vitaly Liman, Sergii Komar, Oleksii Kozlovskyi32-38
-
Real-time Covid-19 diagnosis on embedded IoT platforms
Elmehdi Benmalek, Wajih Rhalem, Atman Jbari, Abdelilah Jilbab, Jamal Elmhamdi39-45
-
Hybrid models for handwriting-based diagnosis of Parkinson's disease
Asma Ouabd, Achraf Benba, Abdelilah Jilbab, Ahmed Hammouch46-50
-
Computer system for diagnostic and treatment of unilateral neglect syndrome
Krzysztof Strzecha, Agata Bukalska-Strzecha, Krzysztof Kurzdym, Dominik Sankowski51-55
-
Informatics and measurement in healthcare: deep learning for diabetic patient readmission prediction
Shiva Saffari, Mahdi Bahaghighat56-64
-
Optimization of non-invasive glucose monitoring accuracy using an optical sensor
Nurzhigit Smailov, Aliya Zilgarayeva, Sergii Pavlov, Balzhan Turusbekova, Akezhan Sabibolda65-70
-
Stochastic multi-objective minimax optimization of combined electromagnetic shield based on three-dimensional modeling of overhead power lines magnetic field
Borys Kuznetsov, Tatyana Nikitina, Alexander Kutsenko, Ihor Bovdui, Kostiantyn Czunikhin, Olena Voloshko, Roman Voliansky, Viktoriia Ivannikova71-75
-
Advanced energy management strategies for AC/DC microgrids
Zouhir Boumous, Samira Boumous, Tawfik Thelaidjia76-82
-
Experimental study of a multi-stage converter circuit
Kyrmyzy Taissariyeva, Kuanysh Muslimov, Yerlan Tashtay, Gulim Jobalayeva, Lyazzat Ilipbayeva, Ingkar Issakozhayeva, Akezhan Sabibolda83-86
-
Deep learning-based prediction of structural parameters in FDTD-simulated plasmonic nanostructures
Shahed Jahidul Haque, Arman Mohammad Nakib87-94
-
Development of an algorithm for calculating ion exchange processes using the Python ecosystem
Iryna Chub, Oleksii Proskurnia, Kateryna Demchenko, Oleksandr Miroshnyk, Taras Shchur, Serhii Halko95-99
-
Intelligent model for reliability control and safety in urban transport systems
Anastasiia Kashkanova, Alexander Rotshtein, Andrii Kashkanov, Denis Katelnikov100-107
-
Analysis of the interaction of components of a modular parcel storage system using UML diagrams
Lyudmila Samchuk, Yuliia Povstiana, Anastasia Hryshchuk108-116
-
Evaluating modified pairing insertion heuristics for efficient dial-a-ride problem solutions in healthcare logistics
Rodolfo Eleazar Pérez Loaiza, Aaron Guerrero-Campanur, Edmundo Bonilla Huerta117-123
-
Analysis of modern tools, methods of audit and monitoring of database security
Kateryna Mykhailyshyn, Oleh Harasymchuk, Oleh Deineka, Yurii Dreis, Volodymyr Shulha, Yuriy Pepa124-129
-
Improving underwater visuals by fusion of Deep-Retinex and GAN for enhanced image quality in subaquatic environments
Anuradha Chinta, Bharath Kumar Surla, Chaitanya Kodali130-136
-
The mathematical method for assessing the cybersecurity state of cloud services
Yevheniia Ivanchenko, Volodymyr Shulha, Ihor Ivanchenko, Yevhenii Pedchenko, Mari Petrovska137-141
-
Evaluation of the performance of LLMs deployments in selected cloud-based container services
Mateusz Stęgierski, Piotr Szpak, Sławomir Przyłucki142-150
-
Implementing traits in C# using Roslyn Source Generators
Mykhailo Pozur, Viktoria Voitko, Svitlana Bevz, Serhii Burbelo, Olena Kosaruk151-157
-
Impact of customizable orchestrator scheduling on machine learning efficiency in edge environments
Konrad Cłapa, Krzysztof Grudzień, Artur Sierszeń158-163
-
Reconfigured CoARX architecture for implementing ARX hashing in microcontrollers of IoT systems with limited resources
Serhii Zabolotnii, Inna Rozlomii, Andrii Yarmilko, Serhii Naumenko164-169
-
Integral assessment of the spring water quality with the use of fuzzy logic toolkit
Vyacheslav Repeta, Oleksandra Krykhovets, Yurii Kukura170-176
-
Selected issues concerning fibre-optic bending sensors
Les Hotra, Jacek Klimek, Ihor Helzhynskyy, Oksana Boyko, Svitlana Kovtun177-181
Archives
-
Vol. 15 No. 4
2025-12-20 27
-
Vol. 15 No. 3
2025-09-30 24
-
Vol. 15 No. 2
2025-06-27 24
-
Vol. 15 No. 1
2025-03-31 26
-
Vol. 14 No. 4
2024-12-21 25
-
Vol. 14 No. 3
2024-09-30 24
-
Vol. 14 No. 2
2024-06-30 24
-
Vol. 14 No. 1
2024-03-31 23
-
Vol. 13 No. 4
2023-12-20 24
-
Vol. 13 No. 3
2023-09-30 25
-
Vol. 13 No. 2
2023-06-30 14
-
Vol. 13 No. 1
2023-03-31 12
-
Vol. 12 No. 4
2022-12-30 16
-
Vol. 12 No. 3
2022-09-30 15
-
Vol. 12 No. 2
2022-06-30 16
-
Vol. 12 No. 1
2022-03-31 9
-
Vol. 11 No. 4
2021-12-20 15
-
Vol. 11 No. 3
2021-09-30 10
-
Vol. 11 No. 2
2021-06-30 11
-
Vol. 11 No. 1
2021-03-31 14
Main Article Content
DOI
Authors
naumenko.serhii1122@vu.cdu.edu.ua
Abstract
This paper presents CoARX – a reconfigurable coarse-grained architecture tailored for the efficient implementation of ARX-based hash functions in resource-constrained IoT microcontrollers. The architecture is designed to support various cryptographic algorithms based on addition, rotation, and XOR operations, offering a balance between performance, energy efficiency, and hardware simplicity. CoARX employs configurable processing elements with local memory, adaptive routing, and support for both 32-bit and 64-bit operations, making it suitable for implementing lightweight hash functions such as Skein-512, BLAKE-256, and ChaCha20. The study introduces a set of configuration templates enabling dynamic switching between cryptographic modes without modifying the hardware structure. For each algorithm, specific optimization strategies are proposed, including staggered round scheduling for Skein, SIMD-based vector masks for BLAKE, and memoryless route switching for ChaCha20. The dataflow between clusters is optimized using parallel graph decomposition and cluster overlap to minimize routing delays. Experimental results demonstrate that CoARX achieves up to 35% higher performance compared to FPGA-based solutions and over twofold improvement compared to STM32 implementations. The architecture also reduces energy consumption by up to 3× and minimizes memory footprint by 30–60%, depending on the algorithm. These advantages make CoARX a promising platform for secure data processing in embedded and real-time IoT systems operating under limited energy and memory constraints.
Keywords:
References
[1] Abed S. E. et al.: An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Cluster computing 24, 2021, 3065–3084 [https://doi.org/10.1007/s10586-021-03324-1].
[2] Braeken A. et al.: Trusted computing architectures for IoT devices. International Symposium on Applied Reconfigurable Computing (ARC 2024), Aveiro 2024. Lecture Notes in Computer Science, 14553, 241–254, Springer, Cham [https://doi.org/10.1007/978-3-031-55673-9_17].
[3] Chataut R., Phoummalayvane A., Akl R.: Unleashing the power of IoT: A comprehensive review of IoT applications and future prospects in healthcare, agriculture, smart homes, smart cities, and industry 4.0. Sensors 23(16), 2023, 7194 [https://doi.org/10.3390/s23167194].
[4] El-Hadedy M. et al.: Edge crypt-pi: Securing internet of things with light and fast crypto-processor. Future Technologies Conference (FTC), San Francisco 2020, 3, 2020, 749–761 [https://doi.org/10.1007/978-3-030-63092-8_50].
[5] Faure E. et al.: Protection of IoT networks: cryptographic solutions for cybersecurity management. Third International Conference on Cyber Hygiene & Conflict Management in Global Information Networks (CH&CMiGIN 2024), Kyiv 2024, 24–34.
[6] Flores-Martin D. et al.: Towards dynamic and heterogeneous social IoT environments. Computing 105(6), 2023, 1141–1164 [https://doi.org/10.1007/s00607-022-01113-1].
[7] Iavich M. et al.: Post-quantum digital signature scheme for personal data security in communication network systems. Advances in Artificial Systems for Medicine and Education IV, vol. 4. Springer International Publishing 2021, 303–314 [https://doi.org/10.1007/978-3-030-67133-4_28].
[8] Kim T. H.: A Study on Impact of Lightweight Cryptographic Systems on Internet of Things-Based Applications. Asia-pacific Journal of Convergent Research Interchange (APJCRI) 10(1), 2024, 49–59 [http://dx.doi.org/10.47116/apjcri.2024.01.05].
[9] Lefevre C., Mennink B.: Permutation-Based Hash Chains with Application to Password Hashing. IACR Transactions on Symmetric Cryptology 4, 2024, 249–286 [https://doi.org/10.46586/tosc.v2024.i4.249-286].
[10] Li Z. et al.: Enhancing CGRA Efficiency Through Aligned Compute and Communication Provisioning. 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS’25), Rotterdam 1, 2025, 410–425 [https://doi.org/10.1145/3669940.3707230].
[11] Ma K. M. et al.: Design of an soc based on 32-bit risc-v processor with low-latency lightweight cryptographic cores in FPGA. Future Internet 15(5), 2023, 186 [https://doi.org/10.3390/fi15050186].
[12] Niu Z. et al.: Rotational differential-linear distinguishers of ARX ciphers with arbitrary output linear masks. Annual International Cryptology Conference (CRYPTO 2022), Santa Barbara, CA 2022. Lecture Notes in Computer Science 13507. Springer Nature Switzerland, Cham, 2022, 3–32 [https://doi.org/10.1007/978-3-030-77870-5_26].
[13] Pham H. L. et al.: Compact message permutation for a fully pipelined BLAKE-256/512 accelerator. IEEE Access 10, 2022, 68740–68754 [https://doi.org/10.1587/transfun.2023CIP0013].
[14] Radovici A., Culic I.: Embedded systems and architectures. Getting Started with Secure Embedded Systems: Developing IoT Systems for Micro: Bit and Raspberry Pi Pico Using Rust and Tock. Apress Berkeley, 2022 [https://doi.org/10.1007/978-1-4842-7789-8].
[15] Rozlomii I. et al.: Resource-Saving Cryptography for Microcontrollers in Biomedical Devices. IEEE 5th KhPI Week on Advanced Technology (KhPIWeek), Kharkiv 2024, 1–5.
[16] Wali H. G., Iyer N. C., Hiremath S. B.: Hardware Implementation of SPONGENT Lightweight Hash Algorithm. 12th International Conference on Communication and Network Security (ICCNS), Beijing 2022, 105–109 [https://doi.org/10.1145/3586102.3586118].
[17] Windarta S. et al.: Lightweight cryptographic hash functions: Design trends, comparative study, and future directions. IEEE Access 10, 2022, 82272–82294 [https://doi.org/10.1109/ACCESS.2022.3195572].
Article Details
Abstract views: 1

