Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems

被引:20
|
作者
Gutub, Adnan Abdul-Aziz [1 ]
Khan, Farhan Abdul-Aziz [2 ]
机构
[1] Umm Al Qura Univ, Ctr Res Excellence Hajj & Omrah, Mecca 21955, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, Saudi Arabia
关键词
Cryptography Hardware; Hybrid crypto system; Symmetric key; Public key algorithm; DES; AES; RSA; MODULAR MULTIPLICATION ALGORITHM; RSA CRYPTOSYSTEM; MONTGOMERY; REPRESENTATION;
D O I
10.1109/ACSAT.2012.44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods. Symmetric key algorithms (DES and AES) are used in the crypto system to perform data encryption. Public key algorithm (RSA) is used in the crypto system to provide key encryption before key exchange. Combining both the symmetric-key and public-key algorithms provides greater security and some unique features which are only possible in this hybrid system. The crypto system design is modeled using Verilog HDL. The implementation has various modules for DES, AES and RSA. The implementation also has a pseudorandom number generation unit for random generation of keys and a GCD computation unit for RSA. All the hardware modules are designed by Register Transfer Level (RTL) modeling of Verilog HDL using ModelSim SE 5.7e. showing interesting promising results.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [31] METHOD FOR OBTAINING DIGITAL SIGNATURES AND PUBLIC-KEY CRYPTOSYSTEMS
    RIVEST, RL
    SHAMIR, A
    ADLEMAN, L
    [J]. COMMUNICATIONS OF THE ACM, 1978, 21 (02) : 120 - 126
  • [32] BREAKING A CLASS OF PUBLIC-KEY CRYPTOSYSTEMS WITH EUCLID ALGORITHM
    李大兴
    张泽增
    [J]. Science Bulletin, 1991, (10) : 873 - 876
  • [33] Security and reliability of LDPC based public-key cryptosystems
    Saad, D
    Skantzos, NS
    Kabashima, Y
    [J]. PROGRESS OF THEORETICAL PHYSICS SUPPLEMENT, 2005, (157): : 229 - 236
  • [34] DIRECT DEMONSTRATION OF THE POWER TO BREAK PUBLIC-KEY CRYPTOSYSTEMS
    KOYAMA, K
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 14 - 21
  • [35] Public-key cryptosystems from lattice reduction problems
    Goldreich, O
    Goldwasser, S
    Halevi, S
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 112 - 131
  • [36] QTRU: Quaternionic Version of the NTRU Public-Key Cryptosystems
    Malekian, Ehsan
    Zakerolhosseini, Ali
    Mashatan, Atefeh
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 3 (01): : 29 - 42
  • [37] Non-injective knapsack public-key cryptosystems
    Koskinen, JA
    [J]. THEORETICAL COMPUTER SCIENCE, 2001, 255 (1-2) : 401 - 422
  • [38] Security of public-key cryptosystems based on Chebyshev polynomials
    Bergamo, P
    D'Arco, P
    De Santis, A
    Kocarev, L
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) : 1382 - 1393
  • [39] A Reduction Attack on Algebraic Surface Public-Key Cryptosystems
    Iwami, Maki
    [J]. COMPUTER MATHEMATICS, 2008, 5081 : 323 - 332
  • [40] BREAKING A CLASS OF PUBLIC-KEY CRYPTOSYSTEMS WITH EUCLID ALGORITHM
    LI, DX
    ZHANG, ZZ
    [J]. CHINESE SCIENCE BULLETIN, 1991, 36 (10): : 873 - 876