Rapid prototyping for hardware accelerated elliptic curve public-key cryptosystems

被引:0
|
作者
Ernst, M [1 ]
Klupsch, S [1 ]
Hauck, O [1 ]
Huss, SA [1 ]
机构
[1] Tech Univ Darmstadt, Integrated Circuits & Syst Lab, Dept Comp Sci, Darmstadt, Germany
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A generator-based design and validation methodology for rapid prototyping of elliptic curve public-key cryptosystem hardware is described. By their very nature, crypto systems challenge both design and validation. Pure RTL-based synthesis is as unsuitable as is high-level synthesis. Instead, a generator program accepts the two main parameters, key size and multiplier radix, and creates a highly efficient custom RTL description which is synthesized into a FPGA. This approach benefits the design in that it allows to effortlessly exploit the available resources on the FPGA for variable requirements of security and performance. It is also advantageous for validation of the correctness of the design as for small parameter values the design can be tested exhaustively, Thus, the correctness for large key sizes depends only on the correctness of the generator Furthermore, deploying FPGAs supports integration of an ASIC realisation of the same algorithm which boosts performance. By emulating its interface, the ASIC can be accomodated even before fabrication thus enabling mixed FPGA/ASIC acceleration of elliptic curve cryptosystems.
引用
收藏
页码:24 / 29
页数:6
相关论文
共 50 条
  • [1] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    [J]. STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141
  • [2] Hardware/software co-design of elliptic curves public-key cryptosystems
    Zeng, XY
    Zhou, XF
    Zhang, QL
    [J]. 2002 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS AND WEST SINO EXPOSITION PROCEEDINGS, VOLS 1-4, 2002, : 1496 - 1499
  • [3] FPGA based hardware acceleration for elliptic curve public key cryptosystems
    Ernst, M
    Henhapl, B
    Klupsch, S
    Huss, S
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 70 (03) : 299 - 313
  • [4] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [5] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    [J]. New Generation Computing, 2005, 23 : 259 - 275
  • [6] Secure evolvable hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LD
    [J]. NEW GENERATION COMPUTING, 2005, 23 (03) : 259 - 275
  • [7] On the hardware design of elliptic curve public key cryptosystems using programmable cellular automata
    Zied, Guitouni
    Mohsen, Machhout
    Rached, Tourki
    [J]. SCS: 2008 2ND INTERNATIONAL CONFERENCE ON SIGNALS, CIRCUITS AND SYSTEMS, 2008, : 440 - 445
  • [8] Hardware/software co-design of an elliptic curve public-key cryptosystem
    Janssens, S
    Thomas, J
    Borremans, W
    Gijsels, P
    Verbauwhede, I
    Vercauteren, F
    Preneel, B
    Vandewalle, J
    [J]. SIPS 2001: IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS: DESIGN AND IMPLEMENTATION, 2001, : 209 - 216
  • [9] Public-key cryptosystems based on elliptic curves - An evolutionary approach
    Hess, E
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 118 - 118
  • [10] Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems
    Gutub, Adnan Abdul-Aziz
    Khan, Farhan Abdul-Aziz
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 116 - 121