RSA Cryptography Acceleration for Embedded System
نویسندگان
چکیده
Cryptography plays an important role for data security and integrity and is widely adopted, especially in embedded systems. On one hand, we want to reduce the computation overhead of cryptography algorithms; on the other hand, we also want to reduce the energy consumption associated with this computation overhead. In this paper, we explore techniques to improve the overall throughput and energy consumption of RSA (Rivest, Shamir and Adleman) public-key cryptography. Instead of implementing the entire algorithm into hardware format, we carefully implemented a custom coprocessor design to accelerate a single hotspot function of RSA algorithm on a Virtex5 FPGA platform. Then, we compare the effectiveness of the coprocessor design against the software implementation of RSA. The hardware accelerates the execution time by 10% thus minimizing the energy by 9%, achieving our goal. Keywords-Coprocessor; cryptography; RSA; hardware accelerator.
منابع مشابه
RSA & Public Key Cryptography in FPGAs
In this paper an RSA calculation architecture is proposed for FPGAs that addresses the issues of scalability, flexible performance, and silicon efficiency for the hardware acceleration of Public Key crypto systems. Using techniques based around Montgomery math for exponentiation, the proposed RSA calculation architecture is compared to existing FPGA-based solutions for speed, FPGA utilisation, ...
متن کاملHardware-Software Codesign in Embedded Asymmetric Cryptography Application – a Case Study
This paper presents a case study of a hardware-software codesign of the RSA cipher embedded in reconfigurable hardware. The soft cores of Altera’s Nios RISC processor are used as the basic building block of the proposed complete embedded solutions. The effect of moving computationally intensive parts of RSA into an optimized parameterized scalable Montgomery coprocessor(s) is analyzed and compa...
متن کاملAudio Steganography and Security Using Cryptography
Security is as strong as the weakest link. Data transmission in public communication system is not secure because of interception and improper manipulation by eavesdropper. This paper presents the technique for the above requirement. In the proposed method, we use Steganography technique where secret message is embedded within a carrier audio file and the existence of message is hidden from the...
متن کاملComparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. We revisited this statement and implemented elliptic curve point multiplication for 160-bit, 192-bit, and 224-bit NIST/SECG curves over GF(p) and RSA-1024 and RSA-2048 on two 8-bit microcontrollers. To accelerate multiple-precision multiplication...
متن کاملCritical Path Based Hardware Acceleration for Cryptosystems
Data security, energy consumption, and computation speed have all become crucial criteria in the new era of computing and communication technology. Cryptography plays an important role for data security and integrity and is widely adopted. On one hand, we want to reduce the computation overhead of cryptography algorithms; on the other hand, we also want to reduce the energy consumption associat...
متن کامل