CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography
|
|
- Scott Curtis
- 8 years ago
- Views:
Transcription
1 CoProcessor Design for Crypto- Applications using Hyperelliptic Curve Cryptography 28. Februar 2008 Alexander Klimm, Oliver Sander, Jürgen Becker Institut für Technik der Informationsverarbeitung Sylvain Subileau, Daimler AG Institut für Technik der Informationsverarbeitung
2 Overview Motivation Public Key Cryptography Hyperelliptic Curve Cryptography (HECC) Hardware/Software Codesign for HECC on a Xilinx FPGA Measurements and Evaluation Outlook & future Work ITIV 2008, Alexander Klimm 2
3 Motivation Increased need for security of embedded systems Increasing number of embedded devices cell phones, PDAs, ECUs, etc. Networks of embedded devices ECUs, ubiquitous computing, etc. Applications need secure systems chip tuning, c2x, toll systems, etc. Communication and data transfers need to be secured. Industry very cost driven Small Platforms low computation power small memory space short time-to-market ITIV 2008, Alexander Klimm 3
4 Motivation Public Key Cryptography (PKC) in Embedded Systems Advantages: Less storage memory for keys needed Secrets stay inside an entity If one entity is compromised the others remain still secure Easier logistics RSA standard for PKC: Long keys (1024 bit) Probably not secure enough in the future ECC & HECC: Smaller keys (163 bit) and same level of security as RSA computational intensive algorithms Goal: HECC based protocol (few patents) Acceleration of used algorithms Small hardware platform (FPGA) ITIV 2008, Alexander Klimm 4
5 Public-Key Cryptography Eve? Basic Crypto: Alice encrypts a message with a key. Alice m c m Bob Bob decrypts the received cyphertext with his key that matches the encryption key. E(m)=c D(c)=m Disadvantage: Alice needs a key for every possible communication partner. Alice Bob Public-Key Crypto: m c m All encryption-keys are public. E e (m)=c D d (c)=m? Only Bob can decrypt a message that is meant for him with his secret private key. Eve ITIV 2008, Alexander Klimm 5
6 Elliptic Curves - PointAdd - P+Q = R P+(-P) = O O: defined as Point of Infinity Quelle: Certicom Corp. ITIV 2008, Alexander Klimm 6
7 HECC Hyperelliptic Curve Cryptography - PointAdd C2 : v = u 5u + 4u ITIV 2008, Alexander Klimm 7
8 HW/SW Codesign - Design Approach - HECC Implementations so far only in SW Addition Inversion Software Protocol Scalar Mult. HECC Arithmetic PointAdd PointDouble GF2N Arithmetic Multiplication Multiplication MAC MAC Hardware SW Implementions are too slow: Duration of one Scalar Multiplication: Freescale Star12 (16 Bit, 16 MHz): > 5000 ms PowerPC (32 Bit, 80 MHz): > 500 ms Optimized Code ca. 100 ms Goal: 50 ms Implementation on MicroBlaze (32 Bit, 33 MHz) and outsourcing of time-consuming calculations to HW Evaluation of performance and adaptation of HW/SW ITIV 2008, Alexander Klimm 8
9 System Components FPGA Gatewayplatform Spartan (33 MHz) Microcontroller MicroBlaze (32 bit) OPB Bus Microcontroller opb_uartlite Output of Data to PC (i.e. Testlogs) Counter_verylight Co-Processor opb_gpio: LED Debug outputs Counter-verylight a precise Counter to count the system s clock-cycles opb_gpio LED opb_uartlite RS232 ITIV 2008, Alexander Klimm 9
10 CoProzessordesign - Hardware Modules - Hardware Units used: GF(2 n ) Multiplier - MALUd1 Operand A 83 GF-Add (XOR-Logic of two 83 Bit input signals) MAC (Multiply-Accumulate) Operand B MULTIPLY MALUd1 MAC Unit 83 Operand C 83 ADD 83 Result ITIV 2008, Alexander Klimm 10
11 MALUd1 - Setup - GF2n Multiplication - Shift&Add Algorithm with simultaneous reduction of result Setup of module Cell Reduction by adding a reduction polynom (hardcoded, XOR) a_i b(4) b(3) b(2) b(1) b(0) t_next(4) t_next(3) t_next(2) t_next(1) t_next(0) t(5) t(4) p(4) t(3) p(3) t(2) p(2) t(1) p(1) t(0) p(0) ITIV 2008, Alexander Klimm 11
12 Connection of Peripherals to the MicroBlaze Vergleich der Varianten bzgl. Implementierung MicroBlaze ALU (FIFO), zeit, strom Entschlüsselte Daten Instructions Register 32x32 Data-side bus interface OPB CoProzessor (Option A) Interface options a) On-Chip Peripheral Bus (OPB) b) Fast Simplex Link (FSL) FSL1 FSL2 CoProzessor (Option B) ITIV 2008, Alexander Klimm 12
13 Tradeoff: Performance vs. Secure System Vergleich der Varianten bzgl. Implementierung MicroBlaze ALU (FIFO), zeit, strom Entschlüsselte Daten Instructions FSL1 Register 32x32 FSL2 Data-side bus interface OPB CoProzessor Processor Software Algorithms Peripheral System Busses Memory Implementation CoProzessor SIDECHANNEL AWARENESS! ITIV 2008, Alexander Klimm 13
14 Interface MAC/MicroBlaze via OPB -Overview- MicroBlaze ALU Reg Option B Option A MicroBlaze (OPB Master) OPB_Mult2 (OPB Slave) IPIF interface USER_LOGIC_I (user_logic.vhd) FSM: Data Control MAC (MALUd1.vhd + XOR Logic) Registers are accessible (read/write) by Software. Busprotocol is implemented by IPIF. Function of Slave is implemented in user_logic.vhd. OPB Register for Operand A Register for Operand B Register for Operand C Register for Result ITIV 2008, Alexander Klimm 14
15 Interface Multiplier/MicroBlaze via FSL -Overview- MicroBlaze ALU Reg Option A MicroBlaze fsl_hwa fsl_interface (user_logic.vhd) Option B FSL0 FSM: Data Control MULTIPLY FIFO Register for Operand A Data transfer over two FIFO, embedded into the MicroBlaze. Dataflow Control in User Logic FSL1 Register for Operand B Register for Result ITIV 2008, Alexander Klimm 15
16 Comparision of Basic GF Operations 300 Very high benefit for GF- Multiplication 250 Almost no gain for GF-Addition # clk MAC Unit beneficial for PointAdd/-Double operations Software OPB FSL FSL-MAC gf-add (u1+u2) not implemented not implemented gf-mult (u1*u2) ITIV 2008, Alexander Klimm 16
17 Communication-Overhead GF-Multiplication: OPB- Interface FSL- Interface Communication MicroBlaze-HW internal Datatransfer Multiplication OPB : 50% of processing time needed for communication between MicroBlaze and HW. FSL : over 30% of processing time needed for communication between MicroBlaze and HW. ITIV 2008, Alexander Klimm 17
18 Speed Measurement - Comparison Point Add/Point Double & Scalar Multiplication ms max. time Software OPB-Mul OPB-MAC FSL-MUL FSL-MAC hecc-pointadd 30,276 14,014 13,981 13,959 13,925 hecc-pointdouble 25,343 13,591 13,571 13,55 13,529 hecc-scalarmult ITIV 2008, Alexander Klimm ,39 57,479 53,981 48,858 18
19 Resources Used on FPGA Platform - Spartan 500 E - Spartan5000 Spartan1000 Spartan500E MicroBlaze UART-RS232 Other Peripherals CoProcessor Counter_verylight GF_MUL (OPB) Available Resources Spartan3E S500 ft 256-4: 4656 Slices, 9312 FF, 9312 LUTs, Used Resources MicroBlaze: 1020 Slices, 811 FF, input LUTs CoProzessor: 517 Slices, 509 FF, input LUTs UART - RS232 (OPB): 258 Slices, 277 FF, input LUTs Counter_verylight: 188 Slices, 211 FF, input LUTs ITIV 2008, Alexander Klimm 19
20 Summary Goals reached: Time Constraints are met if FSL interfacing is employed. Minimal resources are used. System can be implemented on a fairly small FPGA (Spartan 500E). Evaluation: FSL Interface fast, but FIFOs tend to be very power consuming. OPB Interface too slow to meet timing requirements. Next Steps: Evaluation of the systems security (Side-Channels). Optimization of SW, and CoProzessor. ITIV 2008, Alexander Klimm 20
21 Future Work Architectures CoProcessor PicoBlaze NiosII FPGA Security Storage of secrets, secure memory on FPGAs avoidance of unauthorized access to FPGA and/or its bitstream How are known side-channel attacks a danger to FPGA implementation? Countermeasures against security threats ITIV 2008, Alexander Klimm 21
22 Thank you for your attention. Any Questions? Alexander Klimm Universität Karlsruhe (TH) ITIV (Institut für Technik der Informationsverarbeitung ) klimm@itiv.uni-karlsruhe.de ITIV 2008, Alexander Klimm 22
Von der Hardware zur Software in FPGAs mit Embedded Prozessoren. Alexander Hahn Senior Field Application Engineer Lattice Semiconductor
Von der Hardware zur Software in FPGAs mit Embedded Prozessoren Alexander Hahn Senior Field Application Engineer Lattice Semiconductor AGENDA Overview Mico32 Embedded Processor Development Tool Chain HW/SW
More informationGetting Started with Embedded System Development using MicroBlaze processor & Spartan-3A FPGAs. MicroBlaze
Getting Started with Embedded System Development using MicroBlaze processor & Spartan-3A FPGAs This tutorial is an introduction to Embedded System development with the MicroBlaze soft processor and low
More informationArchitectures and Platforms
Hardware/Software Codesign Arch&Platf. - 1 Architectures and Platforms 1. Architecture Selection: The Basic Trade-Offs 2. General Purpose vs. Application-Specific Processors 3. Processor Specialisation
More informationLesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 7: SYSTEM-ON ON-CHIP (SoC( SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY 1 VLSI chip Integration of high-level components Possess gate-level sophistication in circuits above that of the counter,
More informationIncorporating System-Level Design Tools into Upper-Level Electrical Engineering Courses
Paper 111, ENG 107 Incorporating System-Level Design Tools into Upper-Level Electrical Engineering Courses Abstract Wagdy H Mahmoud University of the District of Columbia wmahmoud@udc.edu This paper provides
More informationKirchhoff Institute for Physics Heidelberg
Kirchhoff Institute for Physics Heidelberg Norbert Abel FPGA: (re-)configuration and embedded Linux 1 Linux Front-end electronics based on ADC and digital signal processing Slow control implemented as
More informationMathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information
The : Keeping Eve The Eavesdropper Away From Your Credit Card Information Department of Mathematics North Dakota State University 16 September 2010 Science Cafe Introduction Disclaimer: is not an internet
More informationHorst Görtz Institute for IT-Security
Horst Görtz Institute for IT-Security On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks Extracting Keys from Xilinx Virtex-II FPGAs Amir Moradi, Alessandro Barenghi, Timo
More informationFPGAs for Trusted Cloud Computing
FPGAs for Trusted Cloud Computing Traditional Servers Datacenter Cloud Servers Datacenter Cloud Manager Client Client Control Client Client Control 2 Existing cloud systems cannot offer strong security
More informationHardware-Software Codesign in Embedded Asymmetric Cryptography Application a Case Study
Hardware-Software Codesign in Embedded Asymmetric Cryptography Application a Case Study Martin Šimka1, Viktor Fischer 2, and Miloš Drutarovský 1 1 Department of Electronics and Multimedia Communications,
More informationMicroBlaze Tutorial Creating a Simple Embedded System and Adding Custom Peripherals Using Xilinx EDK Software Tools
MicroBlaze Tutorial Creating a Simple Embedded System and Adding Custom Peripherals Using Xilinx EDK Software Tools Rod Jesman Fernando Martinez Vallina Jafar Saniie 1 INTRODUCTION This tutorial guides
More informationThe WIMP51: A Simple Processor and Visualization Tool to Introduce Undergraduates to Computer Organization
The WIMP51: A Simple Processor and Visualization Tool to Introduce Undergraduates to Computer Organization David Sullins, Dr. Hardy Pottinger, Dr. Daryl Beetner University of Missouri Rolla Session I.
More informationOffline HW/SW Authentication for Reconfigurable Platforms
Offline HW/SW Authentication for Reconfigurable Platforms Eric Simpson Virginia Tech esimpson@vt.edu Patrick Schaumont Virginia Tech schaum@vt.edu Abstract Many Field-Programmable Gate Array (FPGA) based
More informationELECTENG702 Advanced Embedded Systems. Improving AES128 software for Altera Nios II processor using custom instructions
Assignment ELECTENG702 Advanced Embedded Systems Improving AES128 software for Altera Nios II processor using custom instructions October 1. 2005 Professor Zoran Salcic by Kilian Foerster 10-8 Claybrook
More informationCryptography and Network Security Chapter 10
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 10 Other Public Key Cryptosystems Amongst the tribes of Central
More informationReconfig'09 Cancun, Mexico
Reconfig'09 Cancun, Mexico New OPBHW Interface for Real-Time Partial Reconfiguration of FPGA Julien Delorme, Amor Nafkha, Pierre Leray, Christophe Moy SUPELEC/IETR 10 December 2009 SUPELEC - Campus de
More informationCMS Level 1 Track Trigger
Institut für Technik der Informationsverarbeitung CMS Level 1 Track Trigger An FPGA Approach Management Prof. Dr.-Ing. Dr. h.c. J. Becker Prof. Dr.-Ing. Eric Sax Prof. Dr. rer. nat. W. Stork KIT University
More informationA NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies Alaa_hamami@yahoo.com Dr. Mohammad Alaa Al-
More informationAND8336. Design Examples of On Board Dual Supply Voltage Logic Translators. Prepared by: Jim Lepkowski ON Semiconductor. http://onsemi.
Design Examples of On Board Dual Supply Voltage Logic Translators Prepared by: Jim Lepkowski ON Semiconductor Introduction Logic translators can be used to connect ICs together that are located on the
More informationMATLAB/Simulink Based Hardware/Software Co-Simulation for Designing Using FPGA Configured Soft Processors
MATLAB/Simulink Based Hardware/Software Co-Simulation for Designing Using FPGA Configured Soft Processors Jingzhao Ou and Viktor K. Prasanna Department of Electrical Engineering, University of Southern
More informationBest Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com
Best Practises for LabVIEW FPGA Design Flow 1 Agenda Overall Application Design Flow Host, Real-Time and FPGA LabVIEW FPGA Architecture Development FPGA Design Flow Common FPGA Architectures Testing and
More information7a. System-on-chip design and prototyping platforms
7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit
More informationEli Levi Eli Levi holds B.Sc.EE from the Technion.Working as field application engineer for Systematics, Specializing in HDL design with MATLAB and
Eli Levi Eli Levi holds B.Sc.EE from the Technion.Working as field application engineer for Systematics, Specializing in HDL design with MATLAB and Simulink targeting ASIC/FGPA. Previously Worked as logic
More informationLogiCORE IP AXI Performance Monitor v2.00.a
LogiCORE IP AXI Performance Monitor v2.00.a Product Guide Table of Contents IP Facts Chapter 1: Overview Target Technology................................................................. 9 Applications......................................................................
More informationContents. System Development Models and Methods. Design Abstraction and Views. Synthesis. Control/Data-Flow Models. System Synthesis Models
System Development Models and Methods Dipl.-Inf. Mirko Caspar Version: 10.02.L.r-1.0-100929 Contents HW/SW Codesign Process Design Abstraction and Views Synthesis Control/Data-Flow Models System Synthesis
More informationHardware and Software
Hardware and Software 1 Hardware and Software: A complete design Hardware and software support each other Sometimes it is necessary to shift functions from software to hardware or the other way around
More informationWireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009
Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer October 2009 Jennic highlights Jennic is a fabless semiconductor company providing Wireless Microcontrollers to high-growth
More informationArchitekturen und Einsatz von FPGAs mit integrierten Prozessor Kernen. Hans-Joachim Gelke Institute of Embedded Systems Professur für Mikroelektronik
Architekturen und Einsatz von FPGAs mit integrierten Prozessor Kernen Hans-Joachim Gelke Institute of Embedded Systems Professur für Mikroelektronik Contents Überblick: Aufbau moderner FPGA Einblick: Eigenschaften
More informationReconfigurable System-on-Chip Design
Reconfigurable System-on-Chip Design MITCHELL MYJAK Senior Research Engineer Pacific Northwest National Laboratory PNNL-SA-93202 31 January 2013 1 About Me Biography BSEE, University of Portland, 2002
More informationCycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
More informationRun-Time Scheduling Support for Hybrid CPU/FPGA SoCs
Run-Time Scheduling Support for Hybrid CPU/FPGA SoCs Jason Agron jagron@ittc.ku.edu Acknowledgements I would like to thank Dr. Andrews, Dr. Alexander, and Dr. Sass for assistance and advice in both research
More informationIntroducción. Diseño de sistemas digitales.1
Introducción Adapted from: Mary Jane Irwin ( www.cse.psu.edu/~mji ) www.cse.psu.edu/~cg431 [Original from Computer Organization and Design, Patterson & Hennessy, 2005, UCB] Diseño de sistemas digitales.1
More informationHardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
More informationSecure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
More informationSide Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
More informationCFD Implementation with In-Socket FPGA Accelerators
CFD Implementation with In-Socket FPGA Accelerators Ivan Gonzalez UAM Team at DOVRES FuSim-E Programme Symposium: CFD on Future Architectures C 2 A 2 S 2 E DLR Braunschweig 14 th -15 th October 2009 Outline
More informationHardware Implementations of RSA Using Fast Montgomery Multiplications. ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner
Hardware Implementations of RSA Using Fast Montgomery Multiplications ECE 645 Prof. Gaj Mike Koontz and Ryon Sumner Overview Introduction Functional Specifications Implemented Design and Optimizations
More informationCryptography & Network-Security: Implementations in Hardware
Kris Gaj joined ECE GMU in Fall 1998 Cryptography & Network-Security: Implementations in Hardware http://ece.gmu.edu/crypto-text.htm 6 Ph.D. Students Pawel Chodowiec Charikleia Zouridaki Chang Shu Sashisu
More informationAn Instruction Set Extension for Fast and Memory-Efficient AES Implementation
An Instruction Set Extension for Fast and Memory-Efficient AES Implementation Stefan Tillich, Johann Großschädl, and Alexander Szekely Graz University of Technology Institute for Applied Information Processing
More informationMicrosemi Security Center of Excellence
Microsemi Security Center of Excellence Sales and FAE Training August 24, 2015 1 Outline What is the Security Center of Excellence (SCoE)? Overview of Microsemi s Security capabilities and expertise Threat
More informationModeling a GPS Receiver Using SystemC
Modeling a GPS Receiver using SystemC Modeling a GPS Receiver Using SystemC Bernhard Niemann Reiner Büttner Martin Speitel http://www.iis.fhg.de http://www.iis.fhg.de/kursbuch/kurse/systemc.html The e
More informationTechnical Note. Micron NAND Flash Controller via Xilinx Spartan -3 FPGA. Overview. TN-29-06: NAND Flash Controller on Spartan-3 Overview
Technical Note TN-29-06: NAND Flash Controller on Spartan-3 Overview Micron NAND Flash Controller via Xilinx Spartan -3 FPGA Overview As mobile product capabilities continue to expand, so does the demand
More informationDigitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai 2007. Jens Onno Krah
(DSF) Soft Core Prozessor NIOS II Stand Mai 2007 Jens Onno Krah Cologne University of Applied Sciences www.fh-koeln.de jens_onno.krah@fh-koeln.de NIOS II 1 1 What is Nios II? Altera s Second Generation
More informationMulti-Layered Cryptographic Processor for Network Security
International Journal of Scientific and Research Publications, Volume 2, Issue 10, October 2012 1 Multi-Layered Cryptographic Processor for Network Security Pushp Lata *, V. Anitha ** * M.tech Student,
More informationWhite Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
More informationAn Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method
An Efficient Hardware Architecture for Factoring Integers with the Elliptic Curve Method Jens Franke 1, Thorsten Kleinjung 1, Christof Paar 2, Jan Pelzl 2, Christine Priplata 3, Martin Šimka4, Colin Stahlke
More informationWhat is LOG Storm and what is it useful for?
What is LOG Storm and what is it useful for? LOG Storm is a high-speed digital data logger used for recording and analyzing the activity from embedded electronic systems digital bus and data lines. It
More informationCryptography and Network Security
Cryptography and Network Security Fifth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared
More informationIJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
More informationBuilding Blocks for PRU Development
Building Blocks for PRU Development Module 1 PRU Hardware Overview This session covers a hardware overview of the PRU-ICSS Subsystem. Author: Texas Instruments, Sitara ARM Processors Oct 2014 2 ARM SoC
More informationGoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey
GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With
More informationPre-tested System-on-Chip Design. Accelerates PLD Development
Pre-tested System-on-Chip Design Accelerates PLD Development March 2010 Lattice Semiconductor 5555 Northeast Moore Ct. Hillsboro, Oregon 97124 USA Telephone: (503) 268-8000 www.latticesemi.com 1 Pre-tested
More informationECC is Ready for RFID A Proof in Silicon
ECC is Ready for RFID A Proof in Silicon RFIDsec 08 Presentation Daniel Hein, daniel.hein@gmx.at Johannes Wolkerstorfer, Johannes.Wolkerstorfer@iaik.tugraz.at Norbert Felber, felber@iis.ee.ethz.ch 1 Outline
More informationNetwork Data Security System Design with High Security Insurance
Network Data Security System Design with High Security Insurance First Prize Network Data Security System Design with High Security Insurance Institution: Participants: Instructor: Department of Information
More informationInternational Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0020 ISSN (Online): 2279-0039 International
More informationNORTHEASTERN UNIVERSITY Graduate School of Engineering
NORTHEASTERN UNIVERSITY Graduate School of Engineering Thesis Title: Enabling Communications Between an FPGA s Embedded Processor and its Reconfigurable Resources Author: Joshua Noseworthy Department:
More informationPolymorphic AES Encryption Implementation
Polymorphic AE Encryption Implementation Ricardo Chaves, Leonel ousa Instituto uperior Técnico / INEC-ID Portugal, Lisbon Email: ricardo.chaves@inesc-id.pt Georgi Kuzmanov, tamatis Vassiliadis Computer
More informationToday. Important From Last Time. Old Joke. Computer Security. Embedded Security. Trusted Computing Base
Important From Last Time A system is safety critical when its failure may result in injuries or deaths Verification and validation can dominate overall development effort Today Embedded system security
More informationCryptanalysis with a cost-optimized FPGA cluster
Cryptanalysis with a cost-optimized FPGA cluster Jan Pelzl, Horst Görtz Institute for IT-Security, Germany UCLA IPAM Workshop IV Special Purpose Hardware for Cryptography: Attacks and Applications December
More informationCryptography & Network Security. Introduction. Chester Rebeiro IIT Madras
Cryptography & Network Security Introduction Chester Rebeiro IIT Madras The Connected World 2 Information Storage 3 Increased Security Breaches 81% more in 2015 http://www.pwc.co.uk/assets/pdf/2015-isbs-executive-summary-02.pdf
More informationSHE Secure Hardware Extension
SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it
More informationVehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
More informationCSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
More informationArquitectura Virtex. Delay-Locked Loop (DLL)
Arquitectura Virtex Compuesta de dos elementos principales configurables : CLBs y IOBs. Los CLBs se interconectan a través de una matriz general de routeado (GRM). Posse una intefaz VersaRing que proporciona
More informationCodesign: The World Of Practice
Codesign: The World Of Practice D. Sreenivasa Rao Senior Manager, System Level Integration Group Analog Devices Inc. May 2007 Analog Devices Inc. ADI is focused on high-end signal processing chips and
More informationModel-based system-on-chip design on Altera and Xilinx platforms
CO-DEVELOPMENT MANUFACTURING INNOVATION & SUPPORT Model-based system-on-chip design on Altera and Xilinx platforms Ronald Grootelaar, System Architect RJA.Grootelaar@3t.nl Agenda 3T Company profile Technology
More informationSimplifying System-on-Chip Design through Architecture and System CAD Tools
Simplifying System-on-Chip Design through Architecture and System CAD Tools by Lesley Shannon A Thesis submitted in conformity with the requirements for the Degree of Doctor of Philosophy, Department of
More informationNotes on Network Security Prof. Hemant K. Soni
Chapter 9 Public Key Cryptography and RSA Private-Key Cryptography traditional private/secret/single key cryptography uses one key shared by both sender and receiver if this key is disclosed communications
More informationPerformance Evaluation of AES using Hardware and Software Codesign
Performance Evaluation of AES using Hardware and Software Codesign Vilas V Deotare 1, Dinesh V Padole 2 Ashok S. Wakode 3 Research Scholar,Professor, GHRCE, Nagpur, India vilasdeotare@gmail.com 1, dvpadole@gmail.com
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationSoftware Implementations of Elliptic Curve Cryptography
Software Implementations of Elliptic Curve Cryptography Zhijie Jerry Shi and Hai Yan Computer Science and Engineering Department University of Connecticut, Storrs, CT 06269, USA Email: {zshi, hai.yan}@engr.uconn.edu
More informationProgrammable Parallel Coprocessor Architectures for Reconfigurable System-on-Chip
Programmable Parallel Coprocessor Architectures for Reconfigurable System-on-Chip John Williams and Neil Bergmann School of ITEE, The University of Queensland Brisbane, Australia {jwilliams;n.bergmann}@itee.uq.edu.au
More informationSoftware Implementations of Elliptic Curve Cryptography
International Journal of Network Security, Vol.7, No.1, PP.141 150, July 2008 141 Software Implementations of Elliptic Curve Cryptography Zhijie Jerry Shi and Hai Yan (Corresponding author: Zhijie Jerry
More informationSecure Hardware PV018 Masaryk University Faculty of Informatics
Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators
More informationReconfigurable Architecture Requirements for Co-Designed Virtual Machines
Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra
More informationCRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
More informationOpen Flow Controller and Switch Datasheet
Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development
More informationLMS is a simple but powerful algorithm and can be implemented to take advantage of the Lattice FPGA architecture.
February 2012 Introduction Reference Design RD1031 Adaptive algorithms have become a mainstay in DSP. They are used in wide ranging applications including wireless channel estimation, radar guidance systems,
More information40G MACsec Encryption in an FPGA
40G MACsec Encryption in an FPGA Dr Tom Kean, Managing Director, Algotronix Ltd, 130-10 Calton Road, Edinburgh EH8 8JQ United Kingdom Tel: +44 131 556 9242 Email: tom@algotronix.com February 2012 1 MACsec
More informationTable of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
More informationDesign and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
More informationApplying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
More informationImplementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
More informationSystem Considerations
System Considerations Interfacing Performance Power Size Ease-of Use Programming Interfacing Debugging Cost Device cost System cost Development cost Time to market Integration Peripherals Different Needs?
More informationSeeking Opportunities for Hardware Acceleration in Big Data Analytics
Seeking Opportunities for Hardware Acceleration in Big Data Analytics Paul Chow High-Performance Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Toronto Who
More informationDesign and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
More informationAll Programmable Logic. Hans-Joachim Gelke Institute of Embedded Systems. Zürcher Fachhochschule
All Programmable Logic Hans-Joachim Gelke Institute of Embedded Systems Institute of Embedded Systems 31 Assistants 10 Professors 7 Technical Employees 2 Secretaries www.ines.zhaw.ch Research: Education:
More informationNIOS II Based Embedded Web Server Development for Networking Applications
NIOS II Based Embedded Web Server Development for Networking Applications 1 Sheetal Bhoyar, 2 Dr. D. V. Padole 1 Research Scholar, G. H. Raisoni College of Engineering, Nagpur, India 2 Professor, G. H.
More informationAchieving DRM Robustness. securing the device from the silicon up to the application
Achieving DRM Robustness securing the device from the silicon up to the application A Certicom White Paper November 2005 Introduction Digital Rights Management (DRM) is a critical business enabler for
More informationThe implementation and performance/cost/power analysis of the network security accelerator on SoC applications
The implementation and performance/cost/power analysis of the network security accelerator on SoC applications Ruei-Ting Gu grating@eslab.cse.nsysu.edu.tw Kuo-Huang Chung khchung@eslab.cse.nsysu.edu.tw
More informationReconfigurable Computing. Reconfigurable Architectures. Chapter 3.2
Reconfigurable Architectures Chapter 3.2 Prof. Dr.-Ing. Jürgen Teich Lehrstuhl für Hardware-Software-Co-Design Coarse-Grained Reconfigurable Devices Recall: 1. Brief Historically development (Estrin Fix-Plus
More informationAutomatized Fault Attack Emulation for Penetration Testing
Automatized Fault Attack Emulation for Penetration Testing Johannes Grinschgl 1, Thomas Aichinger 3, Armin Krieg 1, Christian Steger 1, Reinhold Weiss 1, Holger Bock 2, Josef Haid 2 1, Graz University
More informationPertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems
Pertinent Side Channel Attacks on Elliptic Curve Cryptographic Systems Stanford University CS259c/MATH250: Elliptic Curves in Cryptography December 15, 2011 1 Introduction Elliptic curve cryptosystems
More informationPervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
More informationKEEP IT SYNPLE STUPID
Utilizing Programmable Logic for Analyzing Hardware Targets Dmitry Nedospasov SHORT DESCRIPTION Hardware security analysis differs from software security analysis primarily in the tools
More informationIMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
More informationHMI EMBEDDED SYSTEM DESIGN AS A FUNCTION OF TECU
HMI EMBEDDED SYSTEM DESIGN AS A FUNCTION OF TECU Katrenčík J., Čupera J., Fajman M. Department of Technology and Automobile Transport, Faculty of Agronomy, Mendel University in Brno, Zemedelska 1, 613
More informationDevelopment. Igor Sheviakov Manfred Zimmer Peter Göttlicher Qingqing Xia. AGIPD Meeting 01-02 April, 2014
Textmasterformat AGIPD Firmware/Software bearbeiten Igor Sheviakov Manfred Zimmer Peter Göttlicher Qingqing Xia AGIPD Meeting 01-02 April, 2014 Outline Textmasterformat bearbeiten Reminder: hardware set-up
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 1 January 9, 2012 CPSC 467b, Lecture 1 1/22 Course Overview Symmetric Cryptography CPSC 467b, Lecture 1 2/22 Course Overview CPSC
More information