Design of Cryptographic Hardware Architecture for Mobile Computing

被引:2
|
作者
Kim, Mooseop [1 ]
Kim, Youngsae [1 ]
Cho, Hyunsook [1 ]
机构
[1] ETRI, Software & Content Res Lab, Daejeon, South Korea
来源
关键词
Trusted Computing; MTM; Cryptographic circuit; RSA; HASH; Mobile Computing;
D O I
10.3745/JIPS.2009.5.4.187
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents compact cryptographic hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics. The built-in cryptographic engine in the MTM is one of the most important circuit blocks and contributes to the performance of the whole platform because it is used as the key primitive supporting digital signature, platform integrity and command authentication. Unlike personal computers, mobile platforms have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for a compact cryptographic hardware module are required. The proposed cryptographic hardware has a chip area of 38K gates for RSA and 12.4K gates for unified SHA-1 and SHA-256 respectively on a 0.25um CMOS process. The current consumption of the proposed cryptographic hardware consumes at most 3.96mA for RSA and 2.16mA for SHA computations under the 25MHz.
引用
收藏
页码:187 / 196
页数:10
相关论文
共 50 条
  • [21] Provable Cryptographic Security and its Applications to Mobile Wireless Computing
    Craig Gentry
    Zulfikar Ramzan
    Wireless Personal Communications, 2004, 29 : 191 - 203
  • [22] Architecture, design and computing
    Cardoso Llach, Daniel
    Capdevila Werning, Remei
    DEARQ-REVISTA DE ARQUITECTURA-JOURNAL OF ARCHITECTURE, 2009, (04): : 136 - 140
  • [23] Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
    Mooseop Kim
    Deok Gyu Lee
    Jaecheol Ryou
    Personal and Ubiquitous Computing, 2013, 17 : 921 - 932
  • [24] Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing
    Kim, Mooseop
    Lee, Deok Gyu
    Ryou, Jaecheol
    PERSONAL AND UBIQUITOUS COMPUTING, 2013, 17 (05) : 921 - 932
  • [25] A Computing Efficient Hardware Architecture for Sparse Deep Neural Network Computing
    Zhang, Yanwen
    Ouyang, Peng
    Yin, Shouyi
    Zhang, Youguang
    Zhao, Weisheng
    Wei, Shaojun
    2018 14TH IEEE INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT), 2018, : 1261 - 1263
  • [26] Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design
    Mao, Baolei
    Hu, Wei
    Althoff, Alric
    Matai, Janarbek
    Tai, Yu
    Mu, Dejun
    Sherwood, Timothy
    Kastner, Ryan
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (09) : 1719 - 1732
  • [27] Design and Analysis of Pairing Based Cryptographic Hardware for Prime Fields
    Ghosh, Santosh
    2011 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2011, : 363 - 364
  • [28] Toward Design of Advanced System-on-Chip Architecture for Mobile Computing Devices
    BenSaleh, Mohammed S.
    Qasim, Syed Manzoor
    Obeid, Abdulfattah M.
    MOBILE, SECURE, AND PROGRAMMABLE NETWORKING, 2019, 11557 : 88 - 95
  • [29] Embedded cryptographic hardware
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    JOURNAL OF SYSTEMS ARCHITECTURE, 2007, 53 (2-3) : 69 - 71
  • [30] Mobile Cloud Computing: Layered Architecture
    Aliyu, Ahmed
    Abdullah, Abdul Hanan
    Kaiwartya, Omprakash
    Tayyab, Muhammad
    Joda, Usman Mohammed
    2018 SEVENTH ICT INTERNATIONAL STUDENT PROJECT CONFERENCE (ICT-ISPC), 2018, : 6 - 11