An adaptable and scalable asymmetric cryptographic processor

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

In this paper a novel scalable public-key processor architecture is presented that supports modular exponentiation and Elliptic Curve Cryptography over both prime GF(p) and binary GF(2) extension fields. This is achieved by a high performance instruction set that provides a comprehensive range of integer and polynomial basis field arithmetic. The instruction set and associated hardware are generic in nature and do not specifically support any cryptographic algorithms or protocols. Firmware within the device is used to efficiently implement complex and data intensive arithmetic. A firmware library has been developed in order to demonstrate support for numerous exponentiation and ECC approaches, such as different coordinate systems and integer recoding methods. The processor has been developed as a high-performance asymmetric cryptography platform in the form of a scalable Verilog RTL core. Various features of the processor may be scaled, such as the pipeline width and local memory subsystem, in order to suit area, speed and power requirements. The processor is evaluated and compares favourably with previous work in terms of performance while offering an unparalleled degree of flexibility. © 2006 IEEE.
Original languageEnglish
Title of host publicationProceedings of the International Conference on Application-Specific Systems, Architectures and Processors
Pages341-346
Number of pages6
DOIs
Publication statusPublished - Sep 2006
Event17th IEEE International Conference on Application-Specific Systems, Architectures and Processors - Steamboat Springs, Co, United States
Duration: 01 Sep 200601 Sep 2006

Conference

Conference17th IEEE International Conference on Application-Specific Systems, Architectures and Processors
CountryUnited States
CitySteamboat Springs, Co
Period01/09/200601/09/2006

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'An adaptable and scalable asymmetric cryptographic processor'. Together they form a unique fingerprint.

Cite this