Design of Cryptographic Hardware Architecture for Mobile Computing

被引:2
|
作者
Kim, Mooseop [1 ]
Kim, Youngsae [1 ]
Cho, Hyunsook [1 ]
机构
[1] ETRI, Software & Content Res Lab, Daejeon, South Korea
来源
关键词
Trusted Computing; MTM; Cryptographic circuit; RSA; HASH; Mobile Computing;
D O I
10.3745/JIPS.2009.5.4.187
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents compact cryptographic hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics. The built-in cryptographic engine in the MTM is one of the most important circuit blocks and contributes to the performance of the whole platform because it is used as the key primitive supporting digital signature, platform integrity and command authentication. Unlike personal computers, mobile platforms have very stringent limitations with respect to available power, physical circuit area, and cost. Therefore special architecture and design methods for a compact cryptographic hardware module are required. The proposed cryptographic hardware has a chip area of 38K gates for RSA and 12.4K gates for unified SHA-1 and SHA-256 respectively on a 0.25um CMOS process. The current consumption of the proposed cryptographic hardware consumes at most 3.96mA for RSA and 2.16mA for SHA computations under the 25MHz.
引用
收藏
页码:187 / 196
页数:10
相关论文
共 50 条
  • [31] Embedded cryptographic hardware
    Nedjah, Nadia
    Mourelle, Luiza de Macedo
    INTEGRATION-THE VLSI JOURNAL, 2007, 40 (01) : 1 - 2
  • [32] Mobile cloud computing: Architecture and Security
    Wang, Suzhen
    Du, Zhijuan
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2274 - 2281
  • [33] Edge Computing Architecture for Mobile Crowdsensing
    Marjanovic, Martina
    Antonic, Aleksandar
    Zarko, Ivana Podnar
    IEEE ACCESS, 2018, 6 : 10662 - 10674
  • [34] Software architecture for mobile distributed computing
    Issarny, V
    Tartanoglu, F
    Liu, JS
    Sailhan, F
    FOURTH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA 2004), PROCEEDINGS, 2004, : 201 - 210
  • [35] A Practical Architecture for Mobile Edge Computing
    Subramanya, Tejas
    Goratti, Leonardo
    Khan, Shah Nawaz
    Kafetzakis, Emmanouil
    Giannoulakis, Ioannis
    Riggio, Roberto
    2017 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS (NFV-SDN), 2017, : 174 - 177
  • [36] GPU Architecture Optimization For Mobile Computing
    Aldahlawi, Abdulsami
    Kim, Kyung Ki
    Kim, Yang-Bin
    2019 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2019, : 247 - 248
  • [37] Efficient cryptographic hardware using the co-design methodology
    Mourelle, LD
    Nedjah, N
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 508 - 512
  • [38] A network architecture for heterogeneous mobile computing
    Brewer, EA
    Katz, RH
    Chawathe, Y
    Gribble, SD
    Hodes, T
    Nguyen, G
    Stemm, M
    Henderson, T
    Amir, E
    Balakrishnan, H
    Fox, A
    Padmanabhan, VN
    Seshan, S
    IEEE PERSONAL COMMUNICATIONS, 1998, 5 (05): : 8 - 24
  • [39] A Hardware-Efficient Elliptic Curve Cryptographic Architecture over GF (p)
    Cui, Chao
    Zhao, Yun
    Xiao, Yong
    Lin, Weibin
    Xu, Di
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2021, 2021
  • [40] DISTRIBUTED COMPUTING ISSUES IN HARDWARE DESIGN
    CLARKE, EM
    DISTRIBUTED COMPUTING, 1986, 1 (04) : 185 - 186