An Energy Efficient Datapath for Asymmetric Cryptography
نویسندگان
چکیده
Public key encryption on resource constrained devices can be a burden in terms of latencies per operation but also in terms of energy consumed. For certain applications, such as WSN and RFID tags, the energy budget is quite small. Understanding the energy cost of each public key operation is important. This paper explores the energy consumption of public key cryptography by presenting a parameterizable microarchitecture for accelerating public key operations and demonstrating how the datapath width and key size effects the energy consumption per Montgomery multiplication, a key component of public key encryption algorithms. We find that for O(n) algorithms, like Montgomery multiplication, a larger datapath provides optimal energy efficiency. Moreover, our microarchitecture is capable of reducing the energy consumption of Montgomery multiplication by a factor of 50 while providing a speed up of 10x for a key size of 192-bits over the traditional software implementation on a low-power embedded processor.
منابع مشابه
Toward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملAsymmetric Concealed Data Aggregation Techniques in Wireless Sensor Networks: A Survey
The wireless communication nature of remotely deployed sensor nodes make the attacks more easily to be happened in wireless sensor networks (WSNs). But traditional security algorithms are infeasible in WSNs due to the limited computing, communication power, storage, band width and energy of sensor nodes. So energy efficient secure data aggregation schemes are necessary in resource constrained W...
متن کاملCCproc: An Efficient Cryptographic Coprocessor
In this paper we introduce CCproc, a symmetric-key cryptographic (co)processor with a custom instruction set optimized for cryptographic applications. We study ten popular crypto algorithms, and provide custom solutions for them, while we also offer general support for future encryption algorithms. We design a custom but simple datapath able to execute the proposed instruction set and analyze i...
متن کاملCyclic Redundancy Checking (CRC) Accelerator for Embedded Processor Datapaths
We present the integration of a multimode Cyclic Redundancy Checking (CRC) accelerator unit with an embedded processor datapath to enhance the processor performance in terms of execution time and energy efficiency. We investigate the performance of CRC accelerated embedded processor datapath in terms of execution time and energy efficiency. Our evaluation shows that the CRC accelerated Microbla...
متن کاملAn Energy Efficient AES Engine with DPA-Resistance
The advent of portable electronics which transmit and receive sensitive data via wireless communication have led to interest in the design of energy-efficient security engines. The hardware implementation of cryptographic algorithms, however, leaks side-channel information about the operations they process. Differential Power Analysis (DPA) is one of the most powerful attacks to disclose secret...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011