Cod. 10108 | Electronics | 2203.07 Integrated circuits artículo de investigación / research articlennnn Robust and secure s-box design with gated hybrid energy recovery logic (GHERL) for IoT applications Ruban-Gladwin Mariappan and Nehru Kasthuri Dyna | Enero-Febrero 2022 | Vol. 97 nº1 | 79-84 | ISSN-L: 0012-7361 | 79 DOI: https://doi.org/10.6036/10108 | Received: 19/feb/2021 • Reviewing: 24/feb/2021 • Accepted: 27/jul/2021 Robust and secure s-box design with gated hybrid energy recovery logic (GHERL) for IoT applications Diseño robusto y seguro de una s-box con lógica híbrida de recuperación de energía (GHERL) para aplicaciones IoT ABSTRACT The smart Internet of Things (IoT) network relies heavily on data transmission over wireless channels. Hence, it should be de- signed to be robust against the attacks from hackers and antago- nists. The confdentiality in IoT devices is directly proportional to the complexity and power consumption. To mitigate these issues, this paper proposes a secure Substitution Box (S-Box) design that is exploited in the IoT for cyber security applications. The S-Box is based on Gated Hybrid Energy Recovery Logic (GHERL) that is an amalgamation of two different techniques as adiabatic logic and power gating. Adiabatic logic is preferred to attain high energy effciency in practical applications such as portable and handheld devices. Power gating technique is preferred to reduce the leakage power and energy consumption. The proposed GHERL XOR gate and S-Box are implemented with 125nm technology in Tanner EDA tool. The consequences of the experiments exhibits that the no- vel S-Box design with GHERL XOR decreases the power consump- tion by 1.76%, 35.26%, 36.81%, 41.01% and reduces the leakage power by 58.54%, 20.27%, 27.38%, 13.63% when compared with the existing techniques such as S-Box with sleep transistor, dual sleep transistor, dual-stack and sleepy keeper approach. Keywords: Adiabatic logic, Power Gating, Internet of Things, S-Box. 1. INTRODUCTION Internet of Things is an interconnected system and internet- enabled system that is suitable for infrastructure, industrial, com- mercial, consumer applications, monitoring, automation, commu- nication, etc. It is formed by interconnecting objects, devices, elec- trical machines, digital machines, electronic appliances, human or animals that are facilitated with unique identity to transfer the data between networks. It does not require human to computer interaction and human to human interaction. It can transfer the information to the network with the help of smart devices such as Bluetooth, ZigBee, sensors, etc. [1]. The internet connects lot of things with different sizes and different computations to form IoT. It is also termed as the Inter- net of Everything; but it has some limitations such as high power consumption, high complexity and longer processing time [2]. The major issue in the practical implementation of IoT devices is net- work security. High-security ciphers employ a greater number of logic gates, resulting in higher power consumption [3]. Cryptography is used to achieve high security in IoT, which performs data transmission through the wireless communication channel. Based on the secret key, it is divided into symmetric key cryptography and asymmetric key cryptography. In symmetric- key cryptography same key is used for encryption and decryption. But in asymmetric key cryptography, the key will be differing in encryption and decryption process. The four major steps in AES encryption process are Sub Bytes, Shift Rows, Mix Column and Add Round Key. Byte substitution using Sub Bytes is a nonlinear function and the remaining three steps are linear function. Sub Bytes block uses S-Box that follows the Look Up table method to replace every byte in the input. Different types of symmetric and nnnn Ruban-Gladwin Mariappan 1 and Nehru Kasthuri 2 1 Anna University. Chennai. Jayaraj Annapackiam CSI College of Engineering. Electronics and Communication Engineering - 628617 Nazareth, Tamilnadu (India). 2 Anna University. Chennai. Kongu Engineering College. Electronics and Communication Engineering. Perundurai, Tamilnadu (India). RESUMEN • La red inteligente del Internet de las Cosas (IoT) depende en gran medida de la transmisión de datos a través de canales inalámbricos. Por lo tanto, debe ser diseñada para ser robusta contra los ataques de hackers y piratas informáticos. La confdencialidad en los dispositivos IoT es directamente proporcional a la complejidad y al consumo de energía. Para mitigar estos problemas, este trabajo propone un diseño de caja de sustitución segura (S-Box) que se explota en el IoT para aplicaciones de ciberseguridad. La S-Box se basa en la Lógica Híbrida de Recuperación de Energía (GHERL) que es una amalgama de dos técnicas diferentes como son la lógica adiabática y el power gating. La lógica adiabática se prefere para conseguir una alta efciencia energética en aplicaciones prácticas como los dispositivos portátiles y de mano. La técnica de Power Gating se prefere para reducir las pérdidas de potencia y el consumo de energía. La puerta GHERL XOR y la S-Box propuestas se implementan con tecnología de 125nm en la herramienta EDA de Tanner. Los resultados de los experimentos muestran que el nuevo diseño de la S-Box con GHERL XOR disminuye el consumo de energía en un 1,76%, 35,26%, 36,81%, 41,01% y reduce la potencia de fuga en un 58,54%, 20,27%, 27,38%, 13,63% en comparación con las técnicas existentes, como la S-Box con transistor sleep, el transistor dual sleep, el dual-stack y el enfoque sleepy keeper. • Palabras clave: Lógica adiabática, Power Gating, Internet de las cosas, S-Box. To cite this article: MARIAPPAN, Ruban-Gladwin; KASTHURI, Nehru. ROBUST AND SECURE S-BOX DESIGN WITH GATED HYBRID ENERGY RECOVERY LOGIC (GHERL) FOR IOT APPLICATIONS. DYNA. vol. 97, January-February 2022, no. 1, p. 79-84. DOI: http://dx.doi.org/10.603/10108