Dissertation > Excellent graduate degree dissertation topics show
Research and Design of a HighPerformance Scalable Public Key Cryptographic Coprocessor
Author: LiMing
Tutor: ZouXueCheng
School: Huazhong University of Science and Technology
Course: Microelectronics and Solid State Electronics
Keywords: Publickey cryptosystem Coprocessor RSA Elliptic curve cryptosystem Montgomery Algorithm Parallel computing Scalability
CLC: TN918.1
Type: Master's thesis
Year: 2011
Downloads: 15
Quote: 0
Read: Download Dissertation
Abstract
Public key cryptosystem solve the problem of key transmission and management difficulties symmetric cryptosystem, play an important role in the field of information security, digital signature and authentication technologies effectively protect network data transmission integrity and nonrepudiation of the parties to the transaction sex. RSA and ECC (Elliptic Curve Cryptography) is one of the two most important and the most widely used public key cryptography algorithm. RSA's security is based on the large integer prime factor decomposition of the intractability of the security of ECC is based on the intractability of the elliptic curve discrete logarithm problem. ECC algorithm is higher than the RSA algorithm, a singlebit security, equal security strength ECC key length smaller than RSA lot of needed storage space and transmission bandwidth, low computational complexity, the power consumption consume less. Because of the unique advantages of the ECC, ECC can be widely used in the broad field of lowend embedded systems to highend servers, etc.. The performance of public key cryptography algorithm software can not meet the realtime requirements of the practical application, and the key is a very easy to leak. Mainly special the hardware coprocessor way to implement public key cryptography algorithm. The indepth study of the RSA and ECC algorithms, RSA and ECC algorithm has the same core of basic arithmetic modular multiplication mode subtraction, modular exponentiation operation. ECC point operation can be achieved by the basic operations of these core. On this basis, we propose a highperformance scalable public key cryptography coprocessor is used to achieve the basic operations of RSA and ECC modular multiplication, modular exponentiation point subtraction point calculated doubly and point scalar multiplication operation acceleration, and the entire cryptographic protocols using software and hardware co. The coprocessor core the modulo arithmetic cell array parallel computation, the arithmetic unit of each mold by a high performance can be extended Montgomery multiplication unit and a highperformance scalable mode subtraction unit. Montgomery modular multiplication unit based on this paper, a twodomain unified word processing bit wide high radix Montgomery modular multiplication algorithm, its core multiprocessing unit flowing computing architecture to support the dual domain any bit wide operand modular multiplication . Modulus subtraction unit uses the circuit configuration of the word processing bit width, to avoid the mold of a traditional analog subtraction circuit to the reduction step, but optimized for the ECC arithmetic simplifies the addition and subtraction in the ECC arithmetic support dual domain arbitrary bit wide operand mode subtraction. Parallel computing power of the coprocessor mode exponentiation can support parallel binary algorithm and the Chinese Remainder Theorem, ECC point plus point doubly point subtraction in the multiplemode arithmetic unit based on the parallel scheduling, effective the acceleration of the basic operations of RSA and ECC. The highperformance scalable public key cryptography coprocessor design need to optimize the data path width modular multiplication processing unit cell number and modular arithmetic unit number of the design parameters. The optimization of these parameters need to be carried out in this the coprocessor area and performance tradeoffs. 0.18μm CMOS process, coprocessors for different parameter combinations, design evaluation, and the method for selecting the optimal parameter set. A more optimized design parameters, this paper specifically designed and implemented the coprocessor chip maximum operating frequency of 250MHz, area 380kgates. Chip test results show that the coprocessor has good computing acceleration performance, using the Chinese remainder theorem to complete a 1024bit modulus exponentiation domain only 232μs, complete GF (p) domain 192bit scalar multiplication only 242μs to complete GF (2m) the 192bit scalar multiplication only 222μs.

Related Dissertations
 Research and Implemention of Information Security Encryption System Based on the RSA,TP309.7
 Research on Video Compression Algorithm Based on Multicore Computing Platform,TN919.81
 Research and Implementation of Key Techniques of Building Distributed System,TP338.8
 Research and Implementation of the Encryption Algorithm,TP309.7
 Research of Finite Element Method on GPU,O241.82
 Numerical Simulation of Radiofrequency Waves in Magnetized Plasma,TL612
 Design of Security SoC Based on RSA and Eflash,TN47
 Research of the Identitybased Encryption and Signature,TN918.1
 Research on Fine Granularity Scalability Coding and Multipath Transmission Technology,TP212.9
 The Algorithm Researches of Novel Wide Area Backup Protection for Power Grid,TM774
 The Research on Online Adaptive Settings,TM77
 IdentityBased Authentication System Research and Implementation,TN918.1
 Highperformance storage system is a key technology research,TP333
 Internet File Storage Service System,TP393.09
 The other game platform scalability and consistency of shape like,TP393.09
 Fault Tolerance for MapReduce in the Cloud Environment,TP302.8
 High dynamic SINS navigation solution algorithm and parallelization of,TN966
 Image retrieval method and system for parallel computing,TP391.3
 Multicore processor based on RSA Research and Implementation of Parallel Algorithms,TP309.7
 GPUaccelerated particle filter PET image reconstruction algorithm,TP391.41
CLC: > Industrial Technology > Radio electronics, telecommunications technology > Communicate > Confidentiality of communications and communications security > Theory
© 2012 www.DissertationTopic.Net Mobile
