Design of Cryptographic Hardware Architecture for Mobile Computing

被引:2
|
作者
Kim, Mooseop [1 ]
Kim, Youngsae [1 ]
Cho, Hyunsook [1 ]
机构
[1] ETRI, Software & Content Res Lab, Daejeon, South Korea
来源
关键词
Trusted Computing; MTM; Cryptographic circuit; RSA; HASH; Mobile Computing;
D O I
10.3745/JIPS.2009.5.4.187
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents compact cryptographic hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics. The built-in cryptographic engine in the MTM is one of the most important circuit blocks and contributes to the performance of the whole platform because it is used as the key primitive supporting digital signature, platform integrity and command authentication. Unlike personal computers, mobile platforms have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for a compact cryptographic hardware module are required. The proposed cryptographic hardware has a chip area of 38K gates for RSA and 12.4K gates for unified SHA-1 and SHA-256 respectively on a 0.25um CMOS process. The current consumption of the proposed cryptographic hardware consumes at most 3.96mA for RSA and 2.16mA for SHA computations under the 25MHz.
引用
收藏
页码:187 / 196
页数:10
相关论文
共 50 条
  • [1] Asynchronous cryptographic hardware design
    Teifel, John
    2006: 40th Annual IEEE International Carnahan Conferences Security Technology, Proceedings, 2006, : 221 - 227
  • [2] Hardware Design of Cryptographic Accelerator
    Hulic, Michal
    Vokorokos, Liberios
    Adam, Norbert
    Fecil'ak, Peter
    2018 IEEE 16TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2018): DEDICATED TO THE MEMORY OF PIONEER OF ROBOTICS ANTAL (TONY) K. BEJCZY, 2018, : 201 - 206
  • [3] Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
    Kim, Mooseop
    Ryou, Jaecheol
    Jun, Sungik
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 240 - +
  • [4] The design of a cryptographic security architecture
    Gutmann, P
    USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), 1999, : 153 - 168
  • [5] Cellular automata architecture for elliptic curve cryptographic hardware
    Jeon, Jun-Cheol
    Kim, Kee-Won
    Kang, Byung-Heon
    Yoo, Kee-Young
    COMPUTATIONAL SCIENCE - ICCS 2006, PT 3, PROCEEDINGS, 2006, 3993 : 329 - 336
  • [6] A design of hardware cryptographic co-processor
    Fan, MY
    Wang, JH
    Wang, GW
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 234 - 236
  • [7] Design of cellular automata hardware for cryptographic applications
    Franti, E
    Slav, C
    Balan, T
    Dascalu, M
    2004 International Semiconductor Conference, Vols 1and 2, Proceedings, 2004, : 463 - 466
  • [8] KEY MANAGEMENT PROCESS ON THE HARDWARE CRYPTOGRAPHIC MODULE IN THE CLOUD COMPUTING
    Delgado Barroso, John Manuel
    Joyanes Aguilar, Luis
    Garcia Gundin, Pablo
    KEOD 2010: Proceedings of the International Conference on Knowledge Engineering and Ontology Development, 2010, : 493 - 496
  • [9] A HARDWARE DESIGN-MODEL FOR CRYPTOGRAPHIC ALGORITHMS
    DAEMEN, J
    GOVAERTS, R
    VANDEWALLE, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 648 : 419 - 434
  • [10] Power efficient hardware architecture of SHA-1 algorithm for Trusted mobile computing
    Kim, Mooseop
    Ryou, Jaecheol
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2007, 4681 : 375 - +