Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Piyush Mishra is active.

Publication


Featured researches published by Piyush Mishra.


IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems | 2002

Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers

Ramesh Karri; Kaijie Wu; Piyush Mishra; Yongkook Kim

Fault-based side-channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy-based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overheads (either area or performance). The authors investigate systematic approaches to low-cost low-latency CED techniques for symmetric encryption algorithms based on inverse relationships that exist between encryption and decryption at algorithm level, round level, and operation level and develop CED architectures that explore tradeoffs among area overhead, performance penalty, and fault detection latency. The proposed techniques have been validated on FPGA implementations of Advanced Encryption Standard (AES) finalist 128-bit symmetric encryption algorithms.


defect and fault tolerance in vlsi and nanotechnology systems | 2001

Fault-based side-channel cryptanalysis tolerant Rijndael symmetric block cipher architecture

Ramesh Karri; Kaijie Wu; Piyush Mishra; Yongkook Kim

Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based Concurrent Error Detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate systematic approaches to low-cost, low-latency CED for Rijndael symmetric encryption algorithm. These approaches exploit the inverse relationship that exists between Rijndael encryption and decryption at various levels and develop CED architectures that explore the trade-off between area overhead, performance penalty and error detection latency. The proposed techniques have been validated on FPGA implementations.


design automation conference | 2001

Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit symmetric block ciphers

Ramesh Karri; Kaijie Wu; Piyush Mishra; Yongkook Kim

Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate systematic approaches to low-cost, low-latency CED for symmetric encryption algorithms based on the inverse relationship that exists between encryption and decryption at algorithm level, round level and operation level and develop CED architectures that explore the trade-off between area overhead, performance penalty and error detection latency. The proposed techniques have been validated on FPGA implementations of AES finalist 128-bit symmetric encryption algorithms.


Microelectronics Journal | 2003

Concurrent error detection of fault-based side-channel cryptanalysis of 128-bit RC6 block cipher

Kaijie Wu; Piyush Mishra; Ramesh Karri

Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate two systematic approaches to low-cost, low-latency CED for symmetric encryption algorithm RC6. The proposed techniques have been validated on FPGA implementations of RC6, one of the advanced encryption standard finalists.


Mobile Networks and Applications | 2003

Optimizing the energy consumed by secure wireless sessions: wireless transport layer security case study

Ramesh Karri; Piyush Mishra

In this paper we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session by considering the wireless transport layer security protocol. Our analysis showed that data transfers during a secure wireless transaction, number and size of messages exchanged during secure session establishment and cryptographic computations used for data authentication and privacy during secure data transactions in that order are the main sources of energy consumption during a secure wireless session. We developed techniques based on information compression, session negotiation protocol optimization and hardware acceleration of crypto-mechanisms to reduce the energy consumed by a secure session. A mobile test bed was developed to verify our energy management schemes and to study the energy consumption versus security tradeoffs. Using our proposed schemes we were able to reduce the session establishment energy by more than 6.5× and the secure data transaction energy by more than 1.5× during data transmission and by more than 2.5× during data reception.


international conference on communications | 2002

Minimizing energy consumption of secure wireless session with QoS constraints

Ramesh Karri; Piyush Mishra

We investigate techniques to minimize the energy consumed by a secure wireless session without compromising the security of the session. While we have shown elsewhere (see Karri, R. and Mishra, P., submitted to ACM MOBIHOC 2002; http://emme.poly.edu/Goodies/TEMP/MOBIHOC2002.pdf) that the energy consumed by a secure session is reduced by compressing the session negotiation messages, the protocol header and the data, we now show that it is important to match the block size of compression to the data cache size of the device. We also investigate the choice of a bulk encryption algorithm (3DES vs. AES) and a key exchange protocol (Diffie-Hellman vs. RSA) based on the energy consumed by a secure wireless session. These techniques yield energy savings of 1.3/spl times/ during data transmission and 1.2/spl times/ during data reception beyond those obtained by techniques given in our cited paper. These techniques complement and supplement those proposed in that paper, and when combined, yield overall energy savings of 2.1/spl times/ during data transmission and 4.35/spl times/ during data reception.


power and timing modeling optimization and simulation | 2003

Analysis of Energy Consumed by Secure Session Negotiation Protocols in Wireless Networks

Ramesh Karri; Piyush Mishra

Traditionally, researchers have focused on security, complexity, and throughput metrics while designing security protocols for wired networks. Deployment of these security protocols in battery-powered mobile devices has elevated energy consumption into an important design metric. In this paper we study the energy consumption characteristics of secure session negotiation protocols used by IPSec and WTLS protocols. Based on this study we present techniques to optimize energy consumed by secure wireless session negotiation protocols. Proposed techniques achieve 4× to 32× energy savings without compromising the security of wireless sessions. We show that these techniques are platform independent and discuss the impact of platform specific characteristics, such as available system resources, on the presented techniques.


international conference on communications | 2003

Modeling energy efficient secure wireless networks using network simulation

Ramesh Karri; Piyush Mishra

In this paper, we extend OPNET/spl reg/ network simulator wireless local area network (WLAN) models to incorporate energy and security. We then use these models to study (1) performance and energy characteristics of large-scale secure WLAN networks under varying channel conditions and (2) impact of energy-efficient security protocol adaptations proposed in [(R. Karri and P. Mishra, 2003), (R. Karri and P. Mishra, 2002)] on the energy consumed by Internet security protocol (IPSec).


Archive | 2002

Optimizing Ipsec for Energy-Efficient Secure Wireless Sessions

Ramesh Karri; Piyush Mishra

Deployment of security protocols in battery-powered mobile devices has elevated energy consumption to an important design metric of network design. In this chapter we identified the various sources of energy consumption during the setup, operation and tear down of a secure wireless session. We used Internet Security Protocol (IPSec) for our analysis and developed techniques based on information compression, session negotiation protocol optimization and choice of cryptographic primitives to reduce the energy consumed by a secure wireless session. A mobile test bed was developed to validate our energy management schemes which showed that the proposed schemes were able to reduce the session establishment energy by more than 6.5× and the secure data communication energy by more than 25× during data transmission and by more than 3.8× during data reception.


global communications conference | 2003

An investigation into the design of energy-efficient session negotiation protocols for wireless networks

Ramesh Karri; Piyush Mishra

Security protocols use session negotiation protocols for establishing and managing secure sessions and secure data exchange protocols for secure data communications. Deployment of resource-intensive security protocols in battery-powered mobile devices has elevated energy characteristics to an important design metric. In this paper we study the energy consumption characteristics of secure session negotiation protocols within the framework of Internet security protocol (IPSec). Based on the observations made we present techniques to optimize the energy consumed by session negotiation protocols. Proposed techniques achieve 5x to 11x energy savings without compromising the session security. We show that the proposed techniques are platform independent and discuss the impact of platform specific characteristics, such as available system resources, on the energy characteristics of the system.

Collaboration


Dive into the Piyush Mishra's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kaijie Wu

University of Illinois at Chicago

View shared research outputs
Researchain Logo
Decentralizing Knowledge