Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems

被引:20
|
作者
Gutub, Adnan Abdul-Aziz [1 ]
Khan, Farhan Abdul-Aziz [2 ]
机构
[1] Umm Al Qura Univ, Ctr Res Excellence Hajj & Omrah, Mecca 21955, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, Saudi Arabia
关键词
Cryptography Hardware; Hybrid crypto system; Symmetric key; Public key algorithm; DES; AES; RSA; MODULAR MULTIPLICATION ALGORITHM; RSA CRYPTOSYSTEM; MONTGOMERY; REPRESENTATION;
D O I
10.1109/ACSAT.2012.44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods. Symmetric key algorithms (DES and AES) are used in the crypto system to perform data encryption. Public key algorithm (RSA) is used in the crypto system to provide key encryption before key exchange. Combining both the symmetric-key and public-key algorithms provides greater security and some unique features which are only possible in this hybrid system. The crypto system design is modeled using Verilog HDL. The implementation has various modules for DES, AES and RSA. The implementation also has a pseudorandom number generation unit for random generation of keys and a GCD computation unit for RSA. All the hardware modules are designed by Register Transfer Level (RTL) modeling of Verilog HDL using ModelSim SE 5.7e. showing interesting promising results.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [21] Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control
    Wang, Haodong
    Sheng, Bo
    Tan, Chiu C.
    Li, Qun
    [J]. 28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 11 - 18
  • [22] Public-key cryptosystems with primitive power roots of unity
    Hirano, Takato
    Wada, Koichiro
    Tanaka, Keisuke
    [J]. INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 98 - 112
  • [23] Optimal-resilience proactive public-key cryptosystems
    Frankel, Y
    Gemmell, P
    MacKenzie, PD
    Yung, MT
    [J]. 38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 384 - 393
  • [24] On non-Abelian homomorphic public-key cryptosystems
    Grigoriev D.
    Ponomarenko I.
    [J]. Journal of Mathematical Sciences, 2005, 126 (3) : 1158 - 1166
  • [25] Reaction attacks against several public-key cryptosystems
    Hall, C
    Goldberg, I
    Schneier, B
    [J]. INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 1999, 1726 : 2 - 12
  • [26] High-speed algorithms for public-key cryptosystems
    Joseph, G
    Penzhorn, WT
    [J]. 2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 945 - 951
  • [27] An efficient Montgomery exponentiation algorithm for public-key cryptosystems
    Wu, Chia-Long
    Lou, Der-Chyuan
    Chang, Te-Jen
    [J]. ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 284 - +
  • [28] Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits
    Dima Grigoriev
    Ilia Ponomarenko
    [J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 239 - 255
  • [29] Homomorphic public-key cryptosystems and encrypting boolean circuits
    Grigoriev, Dima
    Ponomarenko, Ilia
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (3-4) : 239 - 255
  • [30] Code-Based Public-Key Cryptosystems and Their Applications
    Kobara, Kazukuni
    [J]. INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55