Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems

被引:20
|
作者
Gutub, Adnan Abdul-Aziz [1 ]
Khan, Farhan Abdul-Aziz [2 ]
机构
[1] Umm Al Qura Univ, Ctr Res Excellence Hajj & Omrah, Mecca 21955, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, Saudi Arabia
关键词
Cryptography Hardware; Hybrid crypto system; Symmetric key; Public key algorithm; DES; AES; RSA; MODULAR MULTIPLICATION ALGORITHM; RSA CRYPTOSYSTEM; MONTGOMERY; REPRESENTATION;
D O I
10.1109/ACSAT.2012.44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods. Symmetric key algorithms (DES and AES) are used in the crypto system to perform data encryption. Public key algorithm (RSA) is used in the crypto system to provide key encryption before key exchange. Combining both the symmetric-key and public-key algorithms provides greater security and some unique features which are only possible in this hybrid system. The crypto system design is modeled using Verilog HDL. The implementation has various modules for DES, AES and RSA. The implementation also has a pseudorandom number generation unit for random generation of keys and a GCD computation unit for RSA. All the hardware modules are designed by Register Transfer Level (RTL) modeling of Verilog HDL using ModelSim SE 5.7e. showing interesting promising results.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [1] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [2] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    [J]. New Generation Computing, 2005, 23 : 259 - 275
  • [3] Secure evolvable hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LD
    [J]. NEW GENERATION COMPUTING, 2005, 23 (03) : 259 - 275
  • [4] Coalition public-key cryptosystems
    Anisimov A.V.
    [J]. Cybernetics and Systems Analysis, 2001, 37 (1) : 1 - 12
  • [5] A survey of public-key cryptosystems
    Koblitz, N
    Menezes, AJ
    [J]. SIAM REVIEW, 2004, 46 (04) : 599 - 634
  • [6] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [7] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    [J]. INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [8] PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE
    Naor, Moni
    Segev, Gil
    [J]. SIAM JOURNAL ON COMPUTING, 2012, 41 (04) : 772 - 814
  • [9] Public-Key Cryptosystems Resilient to Key Leakage
    Naor, Moni
    Segev, Gil
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 18 - 35
  • [10] Key Distribution for Heterogeneous Public-Key Cryptosystems
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (05) : 464 - 468