Scalable Instruction Set Extension for Dual - field Public - key Cryptosystem
نویسنده
چکیده
Abstract—As the higher security per bit compared with traditional symmetric-key cryptography, public-key cryptography has always been attractive in security system. But usually the cost is high and efficiency is low because of complex algorithm. Unlike common hardware solution based on FPGA or system on chip (SOC), an instruction set architecture (ISA) extension of embedded processor has been proposed. Firstly the extended function unit is introduced, and the structure is scalable according to different applications. Then the extended instruction set is proposed under a new architecture, to overcome the weakness of traditional ISA extension, such as the flexibility for multiple extended functions and the difficulty of implementation. Opposite to original ISA, detail operation of extended instruction has been treated as side effects of data transfer, to keep the architecture of embedded processor and compilation tools basically unchanged. Test results show that point multiplication on GF(2160) can be done in 181 us, by the cost of 124k gates.
منابع مشابه
Instruction Set Extension for Long Integer Modulo Arithmetic on RISC-Based Smart Cards
Modulo multiplication of long integers (≥ 1024 bits) is the major operation of many public-key cryptosystems like RSA or Diffie-Hellman. The efficient implementation of modulo arithmetic is a challenging task, in particular on smart cards due to their constrained resources and relatively slow clock frequency. In this paper we present the concept of an application-specific instruction set extens...
متن کاملEEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملA FPGA Implementation of High Security Hybrid Reconfigurable Cryptographic Processor with RSA and SEA
Data security is in Demand in everyday life of Digital World, since Digital data’s can be reproduced much easily. To achieve the maximum security required a Parallel Processing, User Reconfigurable Cryptographic RISC Microprocessor is proposed in our paper. Rather than protecting the data using tools and external codes, a microprocessor is specially designed in our project to offer maximum digi...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملA Fast Elliptic Curve Cryptosystem LSI Embedding Word-Based Montgomery Multiplier
Elliptic curve cryptosystems are expected to be a next standard of public-key cryptosystems. A security level of elliptic curve cryptosystems depends on a difficulty of a discrete logarithm problem on elliptic curves. The security level of a elliptic curve cryptosystem which has a public-key of 160-bit is equivalent to that of a RSA system which has a public-key of 1024-bit. We propose an ellip...
متن کامل