An energy efficient reconfigurable public-key cryptography processor architecture

被引:0
|
作者
Goodman, J [1 ]
Chandrakasan, A
机构
[1] Chrysalis ITS, Ottawa, ON K2C 3R7, Canada
[2] MIT, Cambridge, MA 02139 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ever increasing demand for security in portable, energy-constrained environments that lack a coherent security architecture has resulted in the need to provide energy efficient hardware that is algorithm agile. We demonstrate the feasibility of utilizing domain-specific reconfigurable processing for asymmetric cryptographic applications in order to satisfy these constraints. An architecture is proposed that is capable of implementing a full suite of finite field arithmetic over the integers modulo-N, binary Galois Fields, and non-supersingular elliptic curves over GF(2(n)), with operands ranging in size from 8 to 1024 bits. The performance and energy efficiency of the architecture are estimated via simulation and compared to existing solutions (e.g., software and FPGA's), yielding approximately two orders of magnitude reduction in energy consumption at comparable levels of performance and flexibility.
引用
收藏
页码:175 / 190
页数:16
相关论文
共 50 条
  • [1] Am energy-efficient reconfigurable public-key cryptography processor
    Goodman, J
    Chandrakasan, AP
    [J]. IEEE JOURNAL OF SOLID-STATE CIRCUITS, 2001, 36 (11) : 1808 - 1820
  • [2] Reconfigurable processor for public-key cryptography
    Smyth, N
    McLoone, M
    McCanny, JV
    [J]. 2005 IEEE WORKSHOP ON SIGNAL PROCESSING SYSTEMS - DESIGN AND IMPLEMENTATION (SIPS), 2005, : 110 - 115
  • [3] A reconfigurable public-key cryptography coprocessor
    Zeng, XY
    Chen, C
    Zhang, QL
    [J]. PROCEEDINGS OF 2004 IEEE ASIA-PACIFIC CONFERENCE ON ADVANCED SYSTEM INTEGRATED CIRCUITS, 2004, : 172 - 175
  • [4] A Reconfigurable Coprocessor for Public-Key Cryptography
    Su, JianLong
    Wu, Yi
    Bai, Guoqiang
    Wu, Xingjun
    [J]. PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 141 - 145
  • [5] A novel unified architecture for public-key cryptography
    Cilardo, A
    Mazzeo, A
    Mazzocca, N
    Romano, L
    [J]. DESIGNERS' FORUM: DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, 2005, : 52 - 57
  • [6] A reconfigurable modular arithmetic unit for public-key cryptography
    Chen, Tao
    Yu, Bin
    Su, Jin-Hai
    Dai, Zi-bin
    Liu, Jian-Guo
    [J]. ASICON 2007: 2007 7TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2007, : 850 - 853
  • [7] Efficient Public-Key Cryptography in the Presence of Key Leakage
    Dodis, Yevgeniy
    Haralambiev, Kristiyan
    Lopez-Alt, Adriana
    Wichs, Daniel
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 613 - 631
  • [8] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    [J]. AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [9] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2
  • [10] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    [J]. SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &