Design and implementation of crypto co-processor and its application to security systems

被引:0
|
作者
Kim, H [1 ]
Lee, MK
Kim, DK
Chung, SK
Chung, K
机构
[1] Elect & Telecommun Res Inst, Dept Informat Secur Basic, Taegu, South Korea
[2] Inha Univ, Sch Comp Sci & Engn, Inha, South Korea
[3] Pusan Natl Univ, Sch Elect & Comp Engn, Pusan, South Korea
关键词
crypto coprocessor; crypto algorithm; power consumption;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we will present the design and implementation of the crypto coprocessors which can be used for providing the RFID security. By analyzing the power consumption characteristics of our crypto coprocessors, we can see which crypto algorithms can be used for highly resource constrained applications such as RFID. To provide the security mechanism such as integrity and authentication between the RFID tag and the RFID reader, crypto algorithm or security protocol should be implemented at the RFID tag and reader. Moreover, the security mechanism in the RFID tag should be implemented with low power consumption because the resources of RFID tag are highly constrained, that is, the RFID tag has low computing capability and the security mechanism which operates in the RFID tag should be low power consumed. After investigating the power consumption characteristics of our designed crypto processors, we will conclude which crypto algorithm is suitable for providing the security of RFID systems.
引用
收藏
页码:1104 / 1109
页数:6
相关论文
共 50 条
  • [1] Power Analysis Resistant AES Crypto Engine Design and FPGA Implementation for a Network Security Co-processor
    Ji, Yingjie
    Wu, Liji
    Zhang, Xiangmin
    Li, Xiangyu
    2009 IEEE 8TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2009, : 933 - 936
  • [2] Power analysis resistant AES crypto engine design for a network security co-processor
    Wu, Liji
    Ji, Yingjie
    Zhang, Xiangmin
    Li, Xiangyu
    Yang, Yongsheng
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2097 - 2102
  • [3] Design and implementation of a private and public key crypto processor and its application to a security system
    Kim, H
    Lee, S
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004, 50 (01) : 214 - 224
  • [4] Design and implementation of a Co-Processor for providing data protection in embedded systems
    Durga, GV
    Islam, S
    Sachid, AB
    Meera, P
    INDICON 2005 Proceedings, 2005, : 446 - 449
  • [5] Software implementation of ADSL application with a convolution co-processor
    Dujardin, E
    Gay-Bellile, O
    PROCEEDINGS OF THE 1998 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-6, 1998, : 3053 - 3056
  • [6] Crypto-Test-Lab for Security Validation of ECC Co-processor Test Infrastructure
    Lupon, Emili
    Rodriguez-Montanes, Rosa
    Manich, Salvador
    2017 32ND CONFERENCE ON DESIGN OF CIRCUITS AND INTEGRATED SYSTEMS (DCIS), 2017,
  • [7] Design of speech recognition co-processor for the embedded implementation
    Lee, Peng
    Dong, Ming
    Liang, Weiqian
    Liu, Runsheng
    EDSSC: 2007 IEEE INTERNATIONAL CONFERENCE ON ELECTRON DEVICES AND SOLID-STATE CIRCUITS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 1163 - +
  • [8] DESIGN AND IMPLEMENTATION OF ROUGH SET CO-PROCESSOR ON FPGA
    Tiwari, Kanchan S.
    Kothari, Ashwin G.
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2015, 11 (02): : 641 - 656
  • [9] Implementation of a cryptographic co-processor
    Kakarountas, A. P.
    Michail, H.
    PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND PRIVACY (ISP '07): ADVANCED TOPICS IN INFORMATION SECURITY AND PRIVACY, 2007, : 160 - 165
  • [10] Efficient ASIC Implementation of a NB-IoT Security Co-processor
    Sharaf, Mohamed A.
    AbdelBary, Eslam
    Mostafa, Hassan
    Hussein, Ahmed
    Nassar, Amin M.
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 695 - 698