@inproceedings{SkuballaWalzBuehleretal.2021, author = {Matthias Skuballa and Andreas Walz and Heiko B{\"u}hler and Axel Sikora}, title = {Cryptographic Protection of Cyclic Real-Time Communication in Ethernet-Based Fieldbuses: How Much Hardware is Required?}, series = {IEEE Conference on Emerging Technologies \& Factory Automation (ETFA)}, publisher = {IEEE}, issn = {978-1-7281-2989-1 (elektronisch)}, doi = {10.1109/ETFA45728.2021.9613244}, pages = {1 -- 7}, year = {2021}, abstract = {It seems to be a widespread impression that the use of strong cryptography inevitably imposes a prohibitive burden on industrial communication systems, at least inasmuch as real-time requirements in cyclic fieldbus communications are concerned. AES-GCM is a leading cryptographic algorithm for authenticated encryption, which protects data against disclosure and manipulations. We study the use of both hardware and software-based implementations of AES-GCM. By simulations as well as measurements on an FPGA-based prototype setup we gain and substantiate an important insight: for devices with a 100 Mbps full-duplex link, a single low-footprint AES-GCM hardware engine can deterministically cope with the worst-case computational load, i.e., even if the device maintains a maximum number of cyclic communication relations with individual cryptographic keys. Our results show that hardware support for AES-GCM in industrial fieldbus components may actually be very lightweight.}, language = {en} }