Design, Analysis, and FPGA prototyping of High-Performance Arithmetic for Cryptographic Applications Literature Review - Part 1: Cryptographic Algorithms
نویسندگان
چکیده
This report presents a brief survey on secret key and public key cryptography algorithms. These include: block ciphers, stream ciphers, RSA, ElGamal and Elliptic Curve Cryptosystems (ECC). Since ECC achieved security levels comparable to those of traditional public key cryptosystems using smaller keys (160 bits), this work focus more on ECC. Finally, this work also presents a survey on scalar multiplication algorithms used in ECC.
منابع مشابه
Differential Power Analysis: A Serious Threat to FPGA Security
Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...
متن کاملDesign of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملCryptographic Model for Secure Communication on Fpga Using 32-bit Arithmetic Logic Unit and Minimized Hardware Requirement in Complex Data Encryption Algorithm
Security in networking is based on cryptography, the science and art of transforming messages to make them secure and immune to attack. Cryptography can provide confidentiality, integrity, authentication of message. Cryptography can also provide entity authentication. However, cryptographic algorithms impose tremendous processing power demands that can be a bottleneck in high-speed networks. Th...
متن کاملSecurity of Sponge structures
Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...
متن کاملA Parameterizable Processor Architecture for Large Characteristic Pairing-Based Cryptography
Cryptographic pairing (bilinear mapping) is a core algorithm for various cryptography protocols. It is computationally expensive and inefficiently computed with general purpose processors. Although there has been previous work looking into efficient hardware designs for pairing, most of these systems use small characteristic curves which are incompatible with practical software designs. In this...
متن کامل