Design and implementation of a private and public key crypto processor and its application to a security system

被引:0
|
作者
Kim, H [1 ]
Lee, S
机构
[1] ETRI, Taejon 305350, South Korea
[2] POSTECH, Dept Elect & Elect Engn, Pohang 790784, South Korea
关键词
crypto processor; security; AES; KASUMI; SEED; triple-DES; ECC; RSA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents the design and implementation Of a crypto processor, a special-purpose. microprocessor optimized for the execution of cryptography algorithms. This crypto processor, can be used for various security applications such as storage devices, embedded systems, network routers, security gateways using IPSec and SSL protocol, etc. The crypto processor consists of a 32-bit RISC processor block and coprocessor blocks dedicated to. the AES, KASUMI, SEED,, triple-DES private key crypto algorithms and ECC and RSA public key crypto. algorithm. The dedicated coprocessor block permits fast execution of encryption, decryption, and key scheduling operations. The 32-bit RISC processor block can be used to execute various crypto algorithms such as Hash and other application programs such as user authentication and IC card interface. The crypto processor has been designed and implemented using an FPGA, and some par is of crypto algorithms have been fabricated as a single VLSI chip using 0.5 mum CMOS technology. To test and demonstrate the capabilities of this chip, a custom board providing real-time data security for a data storage de-ice has been developed.
引用
收藏
页码:214 / 224
页数:11
相关论文
共 50 条
  • [21] An efficient application of a dynamic crypto system in mobile wireless security
    Soliman, HS
    Omari, M
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 837 - 842
  • [22] The Design and Implementation of Blockchain-Assisted User Public-Private Key Generation Method
    Zhang, Tianhong
    Lan, Zejun
    Gao, Xianming
    Guan, Jianfeng
    MOBILE INTERNET SECURITY, MOBISEC 2021, 2022, 1544 : 122 - 138
  • [23] Security and design of knapsack public key cryptosystems
    He, Jingmin
    Lu, Kaicheng
    Ching Hua Ta Hsueh Hsueh Pao/ Journal of Ching Hua University, 1988, 28 (01): : 89 - 97
  • [24] Design and Implementation of A Debugging System for OpenRISC Processor
    Lian, Lihong
    Li, Xiaochao
    Xiao, Fen
    Guo, Donghui
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 368 - +
  • [25] Hardware Design and Implementation of ECC ased Crypto Processor for Low-Area-Applications on FPGA
    Imran, Malik
    Shafi, Imran
    Jafri, Atif Raza
    Rashid, Muhammad
    2017 INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS & TECHNOLOGIES (ICOSST), 2017, : 54 - 59
  • [26] Biometric key generation and multi round AES crypto system for improved security
    Nagaraju S.
    Nagendra R.
    Balasundaram S.
    Kiran Kumar R.
    Measurement: Sensors, 2023, 30
  • [27] Review of key challenges in public-private partnership implementation
    Batjargal, Temulin
    Zhang, Mengzhong
    JOURNAL OF INFRASTRUCTURE POLICY AND DEVELOPMENT, 2021, 5 (02)
  • [28] Private computing on public platforms: portable application security
    Morris, Thomas H.
    Nair, V. S. S.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (07): : 942 - 958
  • [29] PRIVATE SECURITY, PUBLIC ORDER: THE OUTSOURCING OF PUBLIC SERVICES AND ITS LIMITS
    McHarg, Aileen
    EDINBURGH LAW REVIEW, 2011, 15 (02) : 337 - 339
  • [30] Private Security, Public Order: The Outsourcing of Public Services and its Limits
    Hillebrand, Claudia
    MILLENNIUM-JOURNAL OF INTERNATIONAL STUDIES, 2010, 39 (02): : 577 - 578