A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines
نویسندگان
چکیده
The Elliptic Curve Digital Signature Algorithm (ECDSA) and the Advanced Encryption Standard (AES) are two of the most popular cryptographic algorithms used worldwide. In this paper, we present a hardware implementation of a low-resource cryptographic processor that provides both digital signature generation using ECDSA and encryption/decryption services using AES. The implementation of ECDSA is based on the recommended Fp192 NIST elliptic curve and AES uses 128-bit keys. In order to meet the low-area requirements, we based our design on a sophisticated hardware architecture where a 16-bit datapath gets heavily reused by all algorithms and the memory is implemented as a dedicated RAM macro. The proposed processor has a total chip area of 21 502 GEs where AES needs only 2 387 GEs and SHA-1 requires 889 GEs.
منابع مشابه
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors
Secure communication over public networks like the Internet requires the use of cryptographic algorithms as basic building blocks. Most cryptographic workloads pose a considerable burden on devices like PDAs, cell phones, and sensor nodes, which are limited in processing power, memory and energy. In this paper we present an approach to increase the efficiency of 32-bit processors for handling s...
متن کاملAttacking ECDSA-Enabled RFID Devices
The elliptic curve digital signature algorithm (ECDSA) is used in many devices to provide authentication. In the last few years, more and more ECDSA implementations have been proposed that allow the integration into resource-constrained devices like RFID tags. Their resistance against power-analysis attacks has not been scrutinized so far. In this article, we provide first results of power-anal...
متن کاملThe Implementation and Analysis of the ECDSA on the Motorola StarCore SC140 DSP Primarily Targeting Portable Devices
The viability of the Elliptic Curve Digital Signature Algorithm (ECDSA) on portable devices is important due to the growing wireless communications industry, which has inherent insecurities. The StarCore SC140 DSP (SC140) targets portable devices, and therefore is a prime candidate to study the viability of the ECDSA on such devices. The ECDSA was implemented on the SC140 using a Koblitz curve ...
متن کاملSecure AES Hardware Module for Resource Constrained Devices
Low power consumption, low gate count, and high throughput are standard design criteria for cryptographic coprocessors designated for resource constrained devices such as smart cards. With the advent of side channel attacks, devices’ resistance to such attacks became another major requirement. This paper describes a cryptographic hardware module for an AES algorithm that provides complete prote...
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کامل