Implementation of RSA Algorithm Using SOPC Technology

被引:0
作者
Cai Ken [1 ]
Liang Xiaoying [2 ]
机构
[1] Zhongkai Univ Agr & Engn, Informat Coll, Guangzhou, Guangdong, Peoples R China
[2] Guangdong Womens Polytech Coll, Guangzhou, Peoples R China
来源
2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010) | 2010年
关键词
FPGA; RSA; security; embedded systems; SOPC;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a highly connected world, security in networks is still a significant challenge for researchers. However, cryptographic algorithms are computationally intensive and a number of security schemes have recently emerged intended to overcome the limit processing and power resource. The processors used in Field Programmable Gate Array (FPGA) embedded systems are known to have a modest performance. This paper presents an innovative system-on-a-programmable-chip (SOPC) based approach for the Rivest-Shamir-Adleman (RSA) algorithms evaluation which is implemented on an Altera Cyclone II FPGA. As compared to traditional customize processor design, the proposed implementation of the RSA processor is believed to be low cost, more flexible.
引用
收藏
页码:121 / 124
页数:4
相关论文
共 50 条
[31]   Application of SOPC Technology in Monitoring of Coal Mine Gas [J].
He Hongjiang ;
Guo Hui .
PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION AND INSTRUMENTATION, VOL 4, 2008, :1865-1867
[32]   Efficient FPGA Implementation of RSA Coprocessor Using Scalable Modules [J].
Abu Al-Haija, Qasem ;
Smadi, Mahmoud ;
Al-Ja'fari, Monther ;
Al-Shua'ibi, Abdullah .
9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 :647-654
[33]   Cryptographic Implementation of RSA for Ion Fault Injection Attack [J].
Shao, Cuiping ;
Li, Huiyun ;
Zhang, Xiaolong .
2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,
[34]   Proposed hybrid RSA algorithm for cloud computing [J].
Rohini ;
Sharma, Er Tejinder .
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2018), 2018, :60-64
[35]   A full RNS implementation of RSA [J].
Bajard, JC ;
Imbert, L .
IEEE TRANSACTIONS ON COMPUTERS, 2004, 53 (06) :769-774
[36]   The Application of Blind Signature Based on RSA Algorithm [J].
Duo, Chunhong ;
Yue, Yan ;
Yuan, Chengpeng .
INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 :2290-+
[37]   Design and Implementation of SoPC based Low power Asynchronous Image Processor [J].
Prabakar, T. N. ;
Lakshminarayanan, G. ;
Seetharaman, G. .
MEASUREMENT TECHNOLOGY AND ITS APPLICATION, PTS 1 AND 2, 2013, 239-240 :1179-+
[38]   Research and Design of MVB Bus Administrator Based on SOPC Technology [J].
Wang, Baohua ;
Wang, Lide ;
Nie, Xiaobo ;
Song, Juan .
2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2017, :1195-1198
[39]   A multiplicative attack using LLL algorithm on RSA signatures with redundancy [J].
Misarsky, JF .
ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 :221-234
[40]   A Hybrid Approach for Enhancing Security in IOT using RSA Algorithm [J].
Sai, M. Krishna ;
Sivaramakrishna, N. ;
Teja, P. V. N. S. Ravi ;
Prakash, Kolla Bhanu .
HELIX, 2019, 9 (01) :4758-4762