A Coprocessor Architecture for 80/112-bit Security Related Applications

نویسندگان

چکیده

We have proposed a flexible coprocessor key-authentication architecture for 80/112-bit security-related applications over field by employing Elliptic-curve Diffie Hellman (ECDH) protocol. Towards flexibility, serial input/output interface is used to load/produce secret, public, and shared keys sequentially. Moreover, reduce the hardware resources achieve reasonable time cryptographic computations, we finite digit-serial multiplier using combined shift accumulate techniques. Furthermore, two finite-state-machine controllers are perform efficient control functionalities. The programmed Verilog then implemented on Xilinx Virtex-7 FPGA (field-programmable-gate-array) device. For , use 1351 1789 slices, achieved clock frequency 250 235 MHz, one public key computation 40.50 79.20 μs generation 81.00 158.40 μs. Similarly, consumed power 0.91 1.37 mW, respectively. outperforms state-of-the-art ECDH designs in terms of resources.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Programmable Vector Coprocessor Architecture for Wireless Applications

The physical layers of most wireless protocols are traditionally implemented in ASICs due to the heavy computation requirements. These solutions are costly to design and hardwired solutions that offer no post-programmability. In this paper, we introduce a flexible coprocessor architecture customized for wireless protocols. To accomplish the design, a complete baseband physical layer for the 802...

متن کامل

A processor-coprocessor architecture for high end video applications

High end video applications are still implemented in hardware consisting of many components. Integration of these components on one IC is di cult as they are typically low volume products and often customization is also required, e.g. in studio applications. This is easier on the board level than on an integrated system. Using hardware parameters for customization can partly overcome the exibil...

متن کامل

An Evaluation Architecture for a Network Coprocessor

This paper outlines research currently being conducted by the Cal Poly Intelligent Network Interface Card (CiNIC) project to develop a network coprocessor. The purpose of this coprocessor is to free the host machine from its network processing duties as well as to allow for additional functionality such as hardware-based firewalling or quality of service (QoS) support. We provide an overview of...

متن کامل

A Security Architecture for Electronic Commerce Applications

On the Internet many electronic commerce applications can be used today, but most of them provide only weak security or even none whatsoever. A major cause of this problem is the variety of technologies used to create such applications. Most existing security architectures are not designed to work in different environments. In this paper, we propose a security architecture for generic electroni...

متن کامل

A Security Architecture for Mobility-Related Services

In future wireless networks, mobility-related services, such as Candidate Access Router Discovery, will play a significant role in realizing truly ubiquitous, seamless connectivity. In order for these services to be realized, however, their particular security concerns must be addressed. Moreover, the security solution must be flexible and highly configurable in order to meet the demands of int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2023

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2023.032849