期刊文献+

可扩展公钥密码协处理器的设计与实现 被引量:1

Scalable VLSI Design and Implementation for Asymmetric Keys Cryptosystems Coprocessor
下载PDF
导出
摘要 在信息安全领域中,公钥密码算法具有广泛的应用.模乘、模加(减)为公钥密码算法的关键操作,出于性能上的考虑,往往以协处理器的方式来实现这些操作.针对公钥密码算法的运算特点,本文提出了一种可扩展公钥密码协处理器体系结构以及软硬件协同流水工作方式,并且改进了模加(减)操作的实现方法,可以有效支持公钥密码算法.同时,该协处理器体系结构也可根据不同的硬件复杂度及性能设计折衷要求,进行灵活扩展. In the application of information security,public key cryptographic algorithms play a very important role. The key operations of public key cryptosystems are modular multiplication,modular addition and subtraction,which are always implemented on specific arithmetic coprocessors for performance enhancement. Based on the requirement analysis of public key cryptographic algorithm acceleration,a scalable architecture of public key cryptography coprocessor is presented in this paper. An efficient method called software hardware co-pipeline is employed. Besides ,an efficient method for modular addition is introduced. The introduced hardware is capable of performing all the key operations of public key cryptography. At the same time ,this scal- able architecture provides an easy tradeoff between hardware circuit complexity and performance.
出处 《小型微型计算机系统》 CSCD 北大核心 2007年第2期243-246,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60173040)资助 国家"八六三"高技术研究发展计划基金项目(2002AA1Z1080)资助.
关键词 公钥密码 模乘 模加 软硬件协同流水 可扩展结构 public key cryptography modular multiplication modular addition software hardware co-pipeline scalable architecture
  • 相关文献

参考文献5

  • 1IEEE P1363a/D9.Standard specifications for public key cryptography:additional techniques[S].June 13,2001.
  • 2Alexandre F,Tenca,Cetin K Koc.A scalable architecture for modular multiplication based on montgomery's algorithm[J].IEEE Trans.Computers,2003,52,9:.
  • 3Akashi Satoh,Kohji Takano.A scalable dual-field elliptic curve cryptographic processor[J].IEEE Trans.Computers,2003,52(4):449-460.
  • 4Montgomery P L.Modular multiplication without trial division[J].Math.of Computation,1985,44(170):519-521.
  • 5Cetin K Koc,Acar T.Montgomery multiplication in GF(2k) design[J].Codes and Cryptography,1998,14(1):57-69.

同被引文献5

  • 1赵彦光,白国强,陈弘毅.一种针对特征2域椭圆曲线密码芯片的差分功耗分析[J].微电子学与计算机,2006,23(12):78-81. 被引量:5
  • 2Cilardo A, Coppolino L, Mazzocca N, et al. Elliptic curve cryptography engineering[J]. Proceedings of the IEEE,2006,94(2):395-405.
  • 3Kocher P, Joshua Jaffe, Benjamin Jun. Introduction to differential power analysis and related attacks [ EB/ OL]. [2009 - 09 - 19]. http..//www, cryptography. com/dpa/technical.
  • 4Itoh K , IZu T, Takenaka M. Address bit differential Power analysis of eryptographic schemes OK-ECDH and OK-ECDSA[C]. CHES' 2002, LNCS2523,2003 : 129-143.
  • 5邹程,张鹏,邓高明,赵强.差分功率分析攻击中的信号对齐方法研究[J].微电子学与计算机,2009,26(7):227-229. 被引量:4

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部