1 / 1

Broadband Wireless

Internet Shopping/Banking. Cryptographic Algorithms and Architectures for System-on-Chip M. McLoone, C. McIvor, J. McCanny, C. McGrath, P. Moore, N. Smyth. Networks. High-Speed Security is Vital for today’s Real-time Communications Applications. Broadband Wireless.

fagan
Download Presentation

Broadband Wireless

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. InternetShopping/Banking Cryptographic Algorithms and Architectures for System-on-Chip M. McLoone, C. McIvor, J. McCanny, C. McGrath, P. Moore, N. Smyth Networks High-Speed Security is Vital for today’s Real-time Communications Applications Broadband Wireless Satellite Communications • DESIGN TECHNIQUES • Algorithm manipulation – unified algorithms • Pipelining / Sub-pipelining techniques • Computer Arithmetic techniques • Use onboard memory, embedded mults • Use Shift-register design approach HQ Software is too slow=> Need Hardware Acceleration MilitaryAd Hoc NetworkScenario • RSA • Most widely used public key algorithm • Unique Carry Free Addition Solution • 1024-bit modulus - Encryption rate: 4.6 Mbps • 1024-bit modulus - Decryption rate: 388 Kbps • Fastest reported in literature [2003] • (Equiv Software: 150 Kbps: 64-bit MIPS processor) • Advanced Encryption Standard (AES) • US Federal Encryption Standard since 2001 • One of First Encryption & Decryption Architectures[2001] • Pre-computation of complex operations – 12 Gbps [2001](Equiv Software: 325 Mbps: 933 MHz PIII processor) • Novel on-the-flyAES Decryption Key generation technique – avoids traditional delay [2001] • Multi-functional AES Architecture – supports 3 required key lengths, Encryption & Decryption, Feedback & Non-feedback modes of operation [2002] • MODULAR MULTIPLICATION • Most common operation in public key encryption • Use of embedded multipliers on silicon device • Word-wise method rather than traditional bit-wise • First reported hardware architectures of these methods [2004] • State-machine based methodology for ease of implementation [2004] • SHACAL-2 • EU Encryption Standard since 2003 • First reported performance metrics – 26 Gbps [2003] • Decryption algorithms derived [2003] • Fastest Encryption Algorithm currently available • MODULAR INVERSION • Important operation in public key cryptography • Two single algorithms exist for Classical Modular Inverse & Montgomery Modular Inverse • Developed a single, unified version [2004] • Saving of 33% in the number of Montgomery Multiplications, 50% reduction in area • WLAN SECURITY • Novel IEEE802.11i WLAN solution [2004] • Supports ALL WLAN security protocols eg WEP, TKIP • Backwards compatible & future upgrade ablility • ELLIPTIC CURVE CRYPTOSYSTEMS (ECCs) • Next generation of public key cryptography • Hardware Accelerator combines Modular Mult & Inversion techniques above • 256-bit scalar point multiplication in 3.84 ms • Fastest reported in literature [2004] • PRIVATE KEY RISC MICROPROCESSOR ARCHITECTURE • Novel design comprising DES & AES coprocessors, extended cryptographic instruction set & AES specific instructions (GF Multiplication) [2005]

More Related