scispace - formally typeset
Journal ArticleDOI

Design and implementation of a private and public key crypto processor and its application to a security system

Reads0
Chats0
TLDR
The design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms, which can be used for various security applications such as storage devices, embedded systems, network routers, security gateways using IPSec and SSL protocol, etc.
Abstract
This paper presents the design and implementation of a crypto processor, a special-purpose microprocessor optimized for the execution of cryptography algorithms. This crypto processor can be used for various security applications such as storage devices, embedded systems, network routers, security gateways using IPSec and SSL protocol, etc. The crypto processor consists of a 32-bit RISC processor block and coprocessor blocks dedicated to the AES, KASUMI, SEED, triple-DES private key crypto algorithms and ECC and RSA public key crypto algorithm. The dedicated coprocessor block permits fast execution of encryption, decryption, and key scheduling operations. The 32-bit RISC processor block can be used to execute various crypto algorithms such as Hash and other application programs such as user authentication and IC card interface. The crypto processor has been designed and implemented using an FPGA, and some parts of crypto algorithms has been fabricated as a single VLSI chip using 0.5 /spl mu/m CMOS technology. To test and demonstrate the capabilities of this chip, a custom board providing real-time data security for a data storage device has been developed.

read more

Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Patent

Microprocessor with program and data protection function under multi-task environment

TL;DR: In a microprocessor, a program key for decrypting a program and a data key for encrypting/decrypting data processed by the program are handled as cryptographically inseparable pair inside the microprocessor as mentioned in this paper.
Patent

Collecting and aggregating log data with fault tolerance

TL;DR: In this paper, the authors present a system and methods of collecting and aggregating log data with fault tolerance, where the collector determines the checksum for the batch of multiple messages received from the agent node.
Patent

Microprocessor apparatus and method for performing block cipher cryptographic functions

TL;DR: In this article, the authors present an apparatus and method for performing cryptographic operations on a plurality of input data blocks within a processor, which includes a cryptographic instruction and execution logic coupled to a logic.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book

The Design of Rijndael: AES - The Advanced Encryption Standard

TL;DR: The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI

The Elliptic Curve Digital Signature Algorithm (ECDSA)

TL;DR: The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.