Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems

被引:21
作者
Gutub, Adnan Abdul-Aziz [1 ]
Khan, Farhan Abdul-Aziz [2 ]
机构
[1] Umm Al Qura Univ, Ctr Res Excellence Hajj & Omrah, Mecca 21955, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, Saudi Arabia
来源
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT) | 2012年
关键词
Cryptography Hardware; Hybrid crypto system; Symmetric key; Public key algorithm; DES; AES; RSA; MODULAR MULTIPLICATION ALGORITHM; RSA CRYPTOSYSTEM; MONTGOMERY; REPRESENTATION;
D O I
10.1109/ACSAT.2012.44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods. Symmetric key algorithms (DES and AES) are used in the crypto system to perform data encryption. Public key algorithm (RSA) is used in the crypto system to provide key encryption before key exchange. Combining both the symmetric-key and public-key algorithms provides greater security and some unique features which are only possible in this hybrid system. The crypto system design is modeled using Verilog HDL. The implementation has various modules for DES, AES and RSA. The implementation also has a pseudorandom number generation unit for random generation of keys and a GCD computation unit for RSA. All the hardware modules are designed by Register Transfer Level (RTL) modeling of Verilog HDL using ModelSim SE 5.7e. showing interesting promising results.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 22 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
[Anonymous], FED INF PROC STAND P
[3]   An RNS Montgomery modular multiplication algorithm [J].
Bajard, JC ;
Didier, LS ;
Kornerup, P .
IEEE TRANSACTIONS ON COMPUTERS, 1998, 47 (07) :766-776
[4]   High-radix montgomery modular exponentiation on reconfigurable hardware [J].
Blum, T ;
Paar, C .
IEEE TRANSACTIONS ON COMPUTERS, 2001, 50 (07) :759-764
[5]  
Bouhraoua A., 2006, P INT C MICR ICM 06
[6]   HARDWARE IMPLEMENTATION OF MONTGOMERY MODULAR MULTIPLICATION ALGORITHM [J].
ELDRIDGE, SE ;
WALTER, CD .
IEEE TRANSACTIONS ON COMPUTERS, 1993, 42 (06) :693-699
[7]   A PUBLIC KEY CRYPTOSYSTEM AND A SIGNATURE SCHEME BASED ON DISCRETE LOGARITHMS [J].
ELGAMAL, T .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (04) :469-472
[8]  
Koc C.K., 1994, COMPUTERS DIGITAL TE, V141, P314
[9]   Analyzing and comparing Montgomery multiplication algorithms [J].
Koc, CK ;
Acar, T ;
Kaliski, BS .
IEEE MICRO, 1996, 16 (03) :26-33
[10]   Low-complexity bit-parallel systolic Montgomery multipliers for special classes of GF(2m) [J].
Lee, CY ;
Horng, JS ;
Jou, IC ;
Lu, EH .
IEEE TRANSACTIONS ON COMPUTERS, 2005, 54 (09) :1061-1070