Dissertation > Excellent graduate degree dissertation topics show

Research and Design of a High-Performance Scalable Public Key Cryptographic Coprocessor

Author: LiMing
Tutor: ZouXueCheng
School: Huazhong University of Science and Technology
Course: Microelectronics and Solid State Electronics
Keywords: Public-key cryptosystem Coprocessor RSA Elliptic curve cryptosystem Montgomery Algorithm Parallel computing Scalability
CLC: TN918.1
Type: Master's thesis
Year: 2011
Downloads: 15
Quote: 0
Read: Download Dissertation


Public key cryptosystem solve the problem of key transmission and management difficulties symmetric cryptosystem, play an important role in the field of information security, digital signature and authentication technologies effectively protect network data transmission integrity and non-repudiation of the parties to the transaction sex. RSA and ECC (Elliptic Curve Cryptography) is one of the two most important and the most widely used public key cryptography algorithm. RSA's security is based on the large integer prime factor decomposition of the intractability of the security of ECC is based on the intractability of the elliptic curve discrete logarithm problem. ECC algorithm is higher than the RSA algorithm, a single-bit security, equal security strength ECC key length smaller than RSA lot of needed storage space and transmission bandwidth, low computational complexity, the power consumption consume less. Because of the unique advantages of the ECC, ECC can be widely used in the broad field of low-end embedded systems to high-end servers, etc.. The performance of public key cryptography algorithm software can not meet the real-time requirements of the practical application, and the key is a very easy to leak. Mainly special the hardware coprocessor way to implement public key cryptography algorithm. The in-depth study of the RSA and ECC algorithms, RSA and ECC algorithm has the same core of basic arithmetic modular multiplication mode subtraction, modular exponentiation operation. ECC point operation can be achieved by the basic operations of these core. On this basis, we propose a high-performance scalable public key cryptography coprocessor is used to achieve the basic operations of RSA and ECC modular multiplication, modular exponentiation point subtraction point calculated doubly and point scalar multiplication operation acceleration, and the entire cryptographic protocols using software and hardware co. The coprocessor core the modulo arithmetic cell array parallel computation, the arithmetic unit of each mold by a high performance can be extended Montgomery multiplication unit and a high-performance scalable mode subtraction unit. Montgomery modular multiplication unit based on this paper, a two-domain unified word processing bit wide high radix Montgomery modular multiplication algorithm, its core multi-processing unit flowing computing architecture to support the dual domain any bit wide operand modular multiplication . Modulus subtraction unit uses the circuit configuration of the word processing bit width, to avoid the mold of a traditional analog subtraction circuit to the reduction step, but optimized for the ECC arithmetic simplifies the addition and subtraction in the ECC arithmetic support dual domain arbitrary bit wide operand mode subtraction. Parallel computing power of the coprocessor mode exponentiation can support parallel binary algorithm and the Chinese Remainder Theorem, ECC point plus point doubly point subtraction in the multiple-mode arithmetic unit based on the parallel scheduling, effective the acceleration of the basic operations of RSA and ECC. The high-performance scalable public key cryptography coprocessor design need to optimize the data path width modular multiplication processing unit cell number and modular arithmetic unit number of the design parameters. The optimization of these parameters need to be carried out in this the coprocessor area and performance trade-offs. 0.18μm CMOS process, co-processors for different parameter combinations, design evaluation, and the method for selecting the optimal parameter set. A more optimized design parameters, this paper specifically designed and implemented the coprocessor chip maximum operating frequency of 250MHz, area 380kgates. Chip test results show that the coprocessor has good computing acceleration performance, using the Chinese remainder theorem to complete a 1024bit modulus exponentiation domain only 232μs, complete GF (p) domain 192bit scalar multiplication only 242μs to complete GF (2m) the 192bit scalar multiplication only 222μs.

Related Dissertations

  1. Research and Implemention of Information Security Encryption System Based on the RSA,TP309.7
  2. Research on Video Compression Algorithm Based on Multi-core Computing Platform,TN919.81
  3. Research and Implementation of Key Techniques of Building Distributed System,TP338.8
  4. Research and Implementation of the Encryption Algorithm,TP309.7
  5. Research of Finite Element Method on GPU,O241.82
  6. Numerical Simulation of Radiofrequency Waves in Magnetized Plasma,TL612
  7. Design of Security SoC Based on RSA and Eflash,TN47
  8. Research of the Identity-based Encryption and Signature,TN918.1
  9. Research on Fine Granularity Scalability Coding and Multipath Transmission Technology,TP212.9
  10. The Algorithm Researches of Novel Wide Area Backup Protection for Power Grid,TM774
  11. The Research on Online Adaptive Settings,TM77
  12. Identity-Based Authentication System Research and Implementation,TN918.1
  13. High-performance storage system is a key technology research,TP333
  14. Internet File Storage Service System,TP393.09
  15. The other game platform scalability and consistency of shape like,TP393.09
  16. Fault Tolerance for MapReduce in the Cloud Environment,TP302.8
  17. High dynamic SINS navigation solution algorithm and parallelization of,TN966
  18. Image retrieval method and system for parallel computing,TP391.3
  19. Multi-core processor based on RSA Research and Implementation of Parallel Algorithms,TP309.7
  20. GPU-accelerated particle filter PET image reconstruction algorithm,TP391.41

CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net  Mobile