Cryptonite: a programmable crypto processor architecture for high bandwidth applications
نویسنده
چکیده
Cryptography was and still is one of the most interesting fields in Computer Science-related research. Where its origin lies in military and governmental use, today cryptography is widely used in everyday life. Cryptography secures communication between smart cards and card readers. It scrambles transmissions between DECT telephones and their base stations, it even entered the living rooms through digital Pay TV channels which use cryptographic methods to make sure that only their subscribers can watch their transmissions – and only what they have payed for. Similarly, each DVD player contains cryptographic techniques which were implemented to prevent unauthorized copying and playback. Also for network infrastructures, company intranets, or the global internet with its shared resources, cryptography is essential to secure transmitted data against snooping. This is especially vital to so called virtual private networks (VPNs), where a (virtually) private network is spanned using shared network resources meaning that although a shared medium is used, the spanned network behaves like a private network in terms of data security and connectivity. Even the underlying physical network infrastructure is hidden. One of the biggest problems with modern cryptography is data throughput. Combined video/audio data as on DVDs or broadcasted via Pay TV stations easily needs – depending on the quality – 2 to 10 MBit/s and more which means that networks carrying this data have to be able to provide at least the same bandwidth: A smaller bandwidth would lead to visible and audible artifacts. Such applications require network devices which are not only capable of transporting the incoming data stream but also encrypt or decrypt them without becoming a bottleneck. For this reason, a number of dedicated hardware solutions exist which support one or more crypto algorithms. Naturally, such solutions do not allow to change the supported algorithms. Change of algorithm automatically means change of hardware; similarly, supporting a number of algorithms requires to have several of dedicated architectures each supporting one algorithm. A programmable architecture is a solution to this dilemma. General purpose processors seem to be the ideal candidates for this task, however, these did not supply the needed computation power in the past – and today, where they do, they need too much electric power and produce too much heat. Also, it is not economically sensible to use processors worth several hundred Euro but using only a fraction of their potential. In this thesis a programmable architecture dedicated to typical needs of cryptographic algorithms is presented. Starting with the analysis of several major cryptographic algorithms key parameters and hardware requirements were identified. Based on these, an architecture was designed which not only suits these requirements but also satisfies economic factors like cost of production and power consumption. A number of algorithms were implemented on an architectural simulator and dedicated parts of the architecture were realized using VHDL to measure hardware parameters such as logic use and routability. These numbers were compared against existing solutions; the comparison has proven that a programmable architecture like the one proposed within this work can achieve performance similar to or even better than existing dedicated hardware solutions while still retaining modest hardware requirements.
منابع مشابه
Modelling Cryptonite - On the Design of a Programmable High-Performance Crypto Processor
Cryptographic algorithms – even when designed for easy implementability on general purpose architectures – still show a huge performance gap between implementations in software and those using dedicated hardware. Such hardware is usually only able to deal with one single algorithm or a very narrowly defined set of algorithms. The tradeoff between speed/throughput and flexibility can be eased by...
متن کاملDesign and Implementation of Field Programmable Gate Array Based Baseband Processor for Passive Radio Frequency Identification Tag (TECHNICAL NOTE)
In this paper, an Ultra High Frequency (UHF) base band processor for a passive tag is presented. It proposes a Radio Frequency Identification (RFID) tag digital base band architecture which is compatible with the EPC C C2/ISO18000-6B protocol. Several design approaches such as clock gating technique, clock strobe design and clock management are used. In order to reduce the area Decimal Matrix C...
متن کاملA Secure Programmable Architecture with a Dedicated Tech-mapping Algorithm: Application to a Crypto-processor
With worldwide communications, information technology and confidentiality have become a major issue for exchanging and securing data. Nevertheless the ASIC high costs and the frequent updates in cryptographic standards used in security applications such as homeland security or banking have made the ciphering algorithms on an embedded FPGA (e-FPGA) co-processor a viable alternative. This paper p...
متن کاملDesign and Implementation of Digital Demodulator for Frequency Modulated CW Radar (RESEARCH NOTE)
Radar Signal Processing has been an interesting area of research for realization of programmable digital signal processor using VLSI design techniques. Digital Signal Processing (DSP) algorithms have been an integral design methodology for implementation of high speed application specific real-time systems especially for high resolution radar. CORDIC algorithm, in recent times, is turned out to...
متن کاملA Novel Processor Architecture for Pairing Based Cryptography Applications
Cryptographic pairing (bilinear mapping) is a core algorithm for various cryptography protocols. It is computationally expensive and inefficiently computed with general purpose processors. Although there has been previous work looking into efficient hardware designs for pairing, most of these systems use small characteristic curves which are incompatible with practical software designs. In this...
متن کامل