Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems

被引:21
|
作者
Gutub, Adnan Abdul-Aziz [1 ]
Khan, Farhan Abdul-Aziz [2 ]
机构
[1] Umm Al Qura Univ, Ctr Res Excellence Hajj & Omrah, Mecca 21955, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, Saudi Arabia
来源
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT) | 2012年
关键词
Cryptography Hardware; Hybrid crypto system; Symmetric key; Public key algorithm; DES; AES; RSA; MODULAR MULTIPLICATION ALGORITHM; RSA CRYPTOSYSTEM; MONTGOMERY; REPRESENTATION;
D O I
10.1109/ACSAT.2012.44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods. Symmetric key algorithms (DES and AES) are used in the crypto system to perform data encryption. Public key algorithm (RSA) is used in the crypto system to provide key encryption before key exchange. Combining both the symmetric-key and public-key algorithms provides greater security and some unique features which are only possible in this hybrid system. The crypto system design is modeled using Verilog HDL. The implementation has various modules for DES, AES and RSA. The implementation also has a pseudorandom number generation unit for random generation of keys and a GCD computation unit for RSA. All the hardware modules are designed by Register Transfer Level (RTL) modeling of Verilog HDL using ModelSim SE 5.7e. showing interesting promising results.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [11] Adaptively Secure Threshold Symmetric-Key Encryption
    Mukherjee, Pratyay
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 465 - 487
  • [12] Reconfigurable modular arithmetic logic unit for high-performance Public-Key cryptosystems
    Sakiyama, K.
    Mentens, N.
    Batina, L.
    Preneel, B.
    Verbauwhede, I.
    RECONFIGURABLE COMPUTING: ARCHITECTURES AND APPLICATIONS, 2006, 3985 : 347 - 357
  • [13] An Analysis of Hardware Design of MLWE-Based Public-Key Encryption and Key-Establishment Algorithms
    Nguyen, Tuy Tan
    Nguyen, Tram Thi Bao
    Lee, Hanho
    ELECTRONICS, 2022, 11 (06)
  • [14] A Survey on Fault Attacks on Symmetric Key Cryptosystems
    Baksi, Anubhab
    Bhasin, Shivam
    Breier, Jakub
    Jap, Dirmanto
    Saha, Dhiman
    ACM COMPUTING SURVEYS, 2023, 55 (04)
  • [15] RSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystems
    Günther Brandner
    Applicable Algebra in Engineering, Communication and Computing, 2013, 24 : 17 - 36
  • [16] HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
    Sakiyama, K.
    Batina, L.
    Preneel, B.
    Verbauwhede, I.
    COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (5-6) : 324 - 332
  • [17] RSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystems
    Brandner, Guenther
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2013, 24 (01) : 17 - 36
  • [18] How to Use Metaheuristics for Design of Symmetric-Key Primitives
    Nikolic, Ivica
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 369 - 391
  • [19] Symmetric-key block cipher for image and text cryptography
    Amador, JJ
    Green, RW
    INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY, 2005, 15 (03) : 178 - 188
  • [20] Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions
    O'Melia, Sean
    Elbirt, Adam J.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2010, 18 (11) : 1505 - 1518