Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems

被引:21
|
作者
Gutub, Adnan Abdul-Aziz [1 ]
Khan, Farhan Abdul-Aziz [2 ]
机构
[1] Umm Al Qura Univ, Ctr Res Excellence Hajj & Omrah, Mecca 21955, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, Saudi Arabia
来源
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT) | 2012年
关键词
Cryptography Hardware; Hybrid crypto system; Symmetric key; Public key algorithm; DES; AES; RSA; MODULAR MULTIPLICATION ALGORITHM; RSA CRYPTOSYSTEM; MONTGOMERY; REPRESENTATION;
D O I
10.1109/ACSAT.2012.44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods. Symmetric key algorithms (DES and AES) are used in the crypto system to perform data encryption. Public key algorithm (RSA) is used in the crypto system to provide key encryption before key exchange. Combining both the symmetric-key and public-key algorithms provides greater security and some unique features which are only possible in this hybrid system. The crypto system design is modeled using Verilog HDL. The implementation has various modules for DES, AES and RSA. The implementation also has a pseudorandom number generation unit for random generation of keys and a GCD computation unit for RSA. All the hardware modules are designed by Register Transfer Level (RTL) modeling of Verilog HDL using ModelSim SE 5.7e. showing interesting promising results.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [1] An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map
    Tan, Tao
    Zhang, Liming
    Liu, Shuaikang
    Wang, Lei
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [2] Anole: A Highly Efficient Dynamically Reconfigurable Crypto-Processor for Symmetric-Key Algorithms
    Liu, Leibo
    Wang, Bo
    Deng, Chenchen
    Zhu, Min
    Yin, Shouyi
    Wei, Shaojun
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (12) : 3081 - 3094
  • [3] Cryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry Codes
    Couvreur, Alain
    Marquez-Corbella, Irene
    Pellikaan, Ruud
    CODING THEORY AND APPLICATIONS, 4TH INTERNATIONAL CASTLE MEETING, 2015, 3 : 133 - 140
  • [4] On the implementation of the Advanced Encryption Standard on a public-key crypto-coprocessor
    Garcia, AV
    Seifert, JP
    USENIX ASSOCIATION AND IFIP WG 8.8 (SMART CARDS) PROCEEDINGS OF CARDIS '02 FIFTH SMART CARD RESEARCH AND ADVANCED APPLICATION CONFERENCE, 2002, : 135 - 145
  • [5] DiSE: Distributed Symmetric-key Encryption
    Agrawal, Shashank
    Mohassel, Payman
    Mukherjee, Pratyay
    Rindal, Peter
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1993 - 2010
  • [6] A structured symmetric-key block cipher
    Peyravian, M
    Coppersmith, D
    COMPUTERS & SECURITY, 1999, 18 (02) : 134 - 147
  • [7] Low latency modular multiplication for public-key cryptosystems using a scalable array of parallel processing elements
    Kong, Yinan
    Lai, Yufeng
    2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, : 1039 - 1042
  • [8] FPGA based unified architecture for public key and private key cryptosystems
    Yi Wang
    Renfa Li
    Frontiers of Computer Science, 2013, 7 : 307 - 316
  • [9] Unified signed-digit number adder for RSA and ECC public-key cryptosystems
    Wang, Yi
    Maskell, Douglas L.
    Leiwo, Jussipekka
    Srikanthan, Thambipillai
    2006 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, 2006, : 1655 - +
  • [10] FPGA based unified architecture for public key and private key cryptosystems
    Wang, Yi
    Li, Renfa
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (03) : 307 - 316