Design and implementation of a private and public key crypto processor and its application to a security system

被引:0
|
作者
Kim, H [1 ]
Lee, S
机构
[1] ETRI, Taejon 305350, South Korea
[2] POSTECH, Dept Elect & Elect Engn, Pohang 790784, South Korea
关键词
crypto processor; security; AES; KASUMI; SEED; triple-DES; ECC; RSA;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents the design and implementation Of a crypto processor, a special-purpose. microprocessor optimized for the execution of cryptography algorithms. This crypto processor, can be used for various security applications such as storage devices, embedded systems, network routers, security gateways using IPSec and SSL protocol, etc. The crypto processor consists of a 32-bit RISC processor block and coprocessor blocks dedicated to. the AES, KASUMI, SEED,, triple-DES private key crypto algorithms and ECC and RSA public key crypto. algorithm. The dedicated coprocessor block permits fast execution of encryption, decryption, and key scheduling operations. The 32-bit RISC processor block can be used to execute various crypto algorithms such as Hash and other application programs such as user authentication and IC card interface. The crypto processor has been designed and implemented using an FPGA, and some par is of crypto algorithms have been fabricated as a single VLSI chip using 0.5 mum CMOS technology. To test and demonstrate the capabilities of this chip, a custom board providing real-time data security for a data storage de-ice has been developed.
引用
收藏
页码:214 / 224
页数:11
相关论文
共 50 条
  • [31] Architectures of Flexible Symmetric Key Crypto Engines-A Survey: From Hardware Coprocessor to Multi-Crypto-Processor System on Chip
    Bossuet, Lilian
    Grand, Michael
    Gaspar, Lubos
    Fischer, Viktor
    Gogniat, Guy
    ACM COMPUTING SURVEYS, 2013, 45 (04)
  • [32] On optimizing RSA algorithm implementation on signal processor regarding asymmetric private key length
    Markovic, M
    Ordevic, GD
    Unkasevic, T
    2003 IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING, PROCEEDINGS: FROM CLASSICAL MEASUREMENT TO COMPUTING WITH PERCEPTIONS, 2003, : 73 - 77
  • [33] Post Quantum Public and Private Key Cryptography Optimized for IoT Security
    Kaushik, Ajay
    Vadlamani, Lakshmi Sai Srikar
    Hussain, Mohammed Mohsin
    Sahay, Milind
    Singh, Rahul
    Singh, Ananya Komal
    Indu, S.
    Goswami, Puneet
    Kousik, Nalliyanna Goundar Veerappan
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (02) : 893 - 909
  • [34] Post Quantum Public and Private Key Cryptography Optimized for IoT Security
    Ajay Kaushik
    Lakshmi Sai Srikar Vadlamani
    Mohammed Mohsin Hussain
    Milind Sahay
    Rahul Singh
    Ananya Komal Singh
    S. Indu
    Puneet Goswami
    Nalliyanna Goundar Veerappan Kousik
    Wireless Personal Communications, 2023, 129 : 893 - 909
  • [35] Design and Implementation of Dynamic Key Based Stream Cipher for Cryptographic Processor
    Pandian, K. K. Soundra
    Pal, Saptadeep
    Chandra, Kailash
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [36] Domain specific tools and methods for application in security processor design
    Schaumont, P
    Verbauwhede, I
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2002, 7 (04) : 365 - 383
  • [37] Domain Specific Tools and Methods for Application in Security Processor Design
    Patrick Schaumont
    Ingrid Verbauwhede
    Design Automation for Embedded Systems, 2002, 7 : 365 - 383
  • [38] Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks
    Misra, Sudip
    Goswami, Sumit
    Taneja, Chaynika
    Mukherjee, Anandarup
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (13) : 1992 - 2014
  • [39] Design and implementation of an operating system for composable processor sharing
    Hansson, Andreas
    Ekerhult, Marcus
    Molnos, Anca
    Milutinovic, Aleksandar
    Nelson, Andrew
    Ambrose, Jude
    Goossens, Kees
    MICROPROCESSORS AND MICROSYSTEMS, 2011, 35 (02) : 246 - 260
  • [40] Design and implementation of application software on static security analysis in district power system
    Dou, Yongkang
    Dianli Xitong Zidonghue/Automation of Electric Power Systems, 1998, 22 (05): : 64 - 65