Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems

被引:21
|
作者
Gutub, Adnan Abdul-Aziz [1 ]
Khan, Farhan Abdul-Aziz [2 ]
机构
[1] Umm Al Qura Univ, Ctr Res Excellence Hajj & Omrah, Mecca 21955, Saudi Arabia
[2] King Fahd Univ Petr & Minerals, Dept Comp Engn, Dhahran 31261, Saudi Arabia
来源
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT) | 2012年
关键词
Cryptography Hardware; Hybrid crypto system; Symmetric key; Public key algorithm; DES; AES; RSA; MODULAR MULTIPLICATION ALGORITHM; RSA CRYPTOSYSTEM; MONTGOMERY; REPRESENTATION;
D O I
10.1109/ACSAT.2012.44
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes a hybrid crypto system that utilizes benefits of both symmetric key and public key cryptographic methods. Symmetric key algorithms (DES and AES) are used in the crypto system to perform data encryption. Public key algorithm (RSA) is used in the crypto system to provide key encryption before key exchange. Combining both the symmetric-key and public-key algorithms provides greater security and some unique features which are only possible in this hybrid system. The crypto system design is modeled using Verilog HDL. The implementation has various modules for DES, AES and RSA. The implementation also has a pseudorandom number generation unit for random generation of keys and a GCD computation unit for RSA. All the hardware modules are designed by Register Transfer Level (RTL) modeling of Verilog HDL using ModelSim SE 5.7e. showing interesting promising results.
引用
收藏
页码:116 / 121
页数:6
相关论文
共 50 条
  • [41] Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
    Geetha, R.
    Padmavathy, T.
    Thilagam, T.
    Lallithasree, A.
    WIRELESS PERSONAL COMMUNICATIONS, 2020, 112 (01) : 21 - 36
  • [42] Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm
    R. Geetha
    T. Padmavathy
    T. Thilagam
    A. Lallithasree
    Wireless Personal Communications, 2020, 112 : 21 - 36
  • [43] Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives
    Chen, Shiyao
    Guo, Chun
    Guo, Jian
    Liu, Li
    Wang, Meiqin
    Wei, Puwen
    Xu, Zeyu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (02) : 132 - 175
  • [44] New Public-Key Cryptosystem Based on Two-Dimension DLP
    Zhang, Xiaoqiang
    Zhu, Guiliang
    Wang, Weiping
    Wang, Mengmeng
    Ma, Shilong
    JOURNAL OF COMPUTERS, 2012, 7 (01) : 169 - 178
  • [45] A Software Watermarking Method Based on Public-Key Cryptography and Graph Coloring
    Jiang, Zetao
    Zhong, Rubing
    Zheng, Bina
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 433 - 437
  • [46] Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors
    Hutter, Michael
    Wenger, Erich
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 459 - 474
  • [47] Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors
    Michael Hutter
    Erich Wenger
    Journal of Cryptology, 2020, 33 : 1442 - 1460
  • [48] Study on Modified Public Key Cryptosystem Based on ElGamal and Cramer-Shoup Cryptosystems
    Kim, Seung-rae
    Kyung, Richard
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 280 - 284
  • [49] A Public-key Cryptography and A Entity Authentication Scheme Based on Improved Hyperbolic Function
    Wang, Dahu
    Bai, Heyuan
    Liu, Qunpo
    Tong, Zhaojing
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 530 - 533