Ultra-low Power Encryption Engine for Wireless
Implantable Medical Devices
Saied Hosseini-Khayat
Parvin Bahmanyar
Ehsan Rahiminezhad
Digital System Design Laboratory
Electrical Engineering Department
Ferdowsi University of Mashhad, Mashhad, Iran
skhayat@um.ac.ir
Mohamad Sawan, Fellow, IEEE
Polystim Neurotechnologies Laboratory
Department of Electrical Engineering
Polytechnique Montréal
Montréal, QC H3C 3A7, Canada
Abstract—Wireless implantable medical devices are expected to
perform cryptographic processing at an absolutely low level of
power consumption. This paper presents the design of an ultra-
low power ASIC core implementing the PRESENT encryption
algorithm. To minimize power consumption, subthreshold
CMOS logic is adopted. To implement robust combinational
logic (S-Boxes) in PRESENT at subthreshold, a multiplexor-tree
architecture based on CMOS transmission gates is proposed.
Our post-layout simulations show that our PRESENT core
consumes around 50 nW at 0.35V supply voltage at 25 kHz clock
frequency, proving the feasibility of ultra-low power encryption.
I. INTRODUCTION
Wireless implantable medical devices (WIMDs) employ
radio transmission technology to enable remote patient
monitoring and treatment. However, recent research [1,2] has
brought into attention the potential security hazards associated
with these devices. To design secure WIMDs, we make the
following important observations:
• Power: Most WIMDs are battery-operated throughout
their extended lifetime which may reach up to 10 years.
(Note that replacing an implant normally requires
surgery, which is risky, costly and inconvenient.) A
back-of-the-envelope calculation suggests that for a
modern small ion-lithium battery storing about 3000
Joules of energy to last about 10 years, the average
power consumption of the entire WIMD must be less
than 10 μW. Given that a WIMD must perform a fair
amount of digital signal processing and radio
transmission, the amount of power left for crypto-
processing is severely limited. We aim at designing a
crypto-engine that consumes less than 100 nW.
• Speed: Since vital signals do not vary too fast, most
WIMDs do not require high processing speeds. Among
the fastest signals in body are neural action potentials
which can be safely sampled and processed at round 20
kS/s. Therefore our crypto-engine clock frequency is set
to 25 kHz.
We have chosen to implement the light-weight block
cipher PRESENT [3] as this algorithm provides an adequate
level of security at minimal chip area and circuit complexity.
II. PRESENT ARCHITECTURE DESCRIPTION
The PRESENT block cipher is a light-weight encryption
algorithm [3] for resource-constrained applications.
PRESENT consists of 31 processing rounds and uses a
substitution-permutation network. The data block size is 64
bits. We implement PRESENT-80, a version of PRESENT
that uses a key size of 80 bits. The details of the PRESENT
algorithm are fully described in [3]. Fig. 1 shows a single
round of PRESENT, which consist of (a) bit-wise XOR of
key and data, (b) 4-bit substitution box (the S-box), and (c)
64-bit bit shuffling (the P-box).
The hardware architecture of PRESENT as implemented
in our ASIC core is shown in Fig 2. It is an iterative
architecture to reduce chip area. There are two distinct
processing loops shown in the figure: (a) key expansion loop
(shown on the right-hand side of figure), (b) data processing
loop (shown on the left-hand side of figure). The key
schedule loop expands the main secret key into 32 sub-keys
on-the-fly. The input to this loop is the 80-bit main key. The
data processing loop perform one encryption round of
PRESENT. An 80-bit key is set up at the key input (almost
permanently). A 64-bit plaintext is set up at the plaintext
input. When the reset signal goes low, at the rising edge of
the clock signal, the key register and data register are both
loaded from data and key input ports through their
corresponding multiplexors.
Figure 1. A single round of PRESENT [3]
978-1-4673-2527-1/12/$31.00 ©2012 IEEE 150