Catálogo de publicaciones - libros

Compartir en
redes sociales


Cryptographic Hardware and Embedded Systems: CHES 2006: 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings

Louis Goubin ; Mitsuru Matsui (eds.)

En conferencia: 8º International Workshop on Cryptographic Hardware and Embedded Systems (CHES) . Yokohama, Japan . October 10, 2006 - October 13, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Computer Communication Networks; Special Purpose and Application-Based Systems; Logic Design; Operating Systems; Management of Computing and Information Systems

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-46559-1

ISBN electrónico

978-3-540-46561-4

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks

Konrad Kulikowski; Alexander Smirnov; Alexander Taubin

Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite their benefits for security applications they have not been adapted to current mainstream designs due to the lack of electronic design automation support and their non-standard or proprietary design methodologies. We present a novel asynchronous fine-grain pipeline synthesis methodology that addresses these limitations. It allows synthesis of asynchronous quasi delay insensitive circuits from standard high-level hardware description language (HDL) specifications. We briefly present a proof of concept differential dynamic power balanced micropipeline library cells that are approximately 6 times more balanced than the best (differential dynamic) cells designed using previous balancing methods. An implementation of the Advanced Encryption Standard based on these balanced cells and synthesized using our tool flow shows a 6.6 times throughput improvement over the synchronous automatically pipelined implementation using the same TSMC 0.18 μ m technology synthesized from the same HDL specification.

Palabras clave: Advance Encryption Standard; Dynamic Logic; Register Transfer Level; Hardware Description Language; Fault Attack.

- Hardware Attacks and Countermeasures III | Pp. 399-413

Challenges for Trusted Computing

Ahmad-Reza Sadeghi

The Trusted Computing Group (TCG), an alliance of a large number of IT enterprises, has published a set of specifications aiming at cost-efficient extensions of conventional computer architectures with security-related features and cryptographic mechanisms. The TCG core specification concerns the Trusted Platform Module (TPM) that acts as a root of trust of a computing platform and provides cryptographic primitives which can be used to realize more sophisticated security services. Currently, TPMs are implemented as dedicated chips mounted on the motherboard of a computer and many vendors already ship their platforms equipped with TPMs.

Palabras clave: Computing Platform; System Demand; Trusted Platform Module; Trust Computing; Cryptographic Primitive.

- Invited Talk III | Pp. 414-414

Superscalar Coprocessor for High-Speed Curve-Based Cryptography

K. Sakiyama; L. Batina; B. Preneel; I. Verbauwhede

We propose a superscalar coprocessor for high-speed curve-based cryptography. It accelerates scalar multiplication by exploiting instruction-level parallelism (ILP) dynamically and processing multiple instructions in parallel. The system-level architecture is designed so that the coprocessor can fully utilize the superscalar feature. The implementation results show that scalar multiplication of Elliptic Curve Cryptography (ECC) over GF(2^163), Hyperelliptic Curve Cryptography (HECC) of genus 2 over GF(2^83) and ECC over a composite field, GF((2^83)^2) can be improved by a factor of 1.8, 2.7 and 2.5 respectively compared to the case of a basic single-scalar architecture. This speed-up is achieved by exploiting parallelism in curve-based cryptography. The coprocessor deals with a single instruction that can be used for all field operations such as multiplications and additions. In addition, this instruction only allows one to compute point/divisor operations. Furthermore, we provide also a fair comparison between the three curve-based cryptosystems.

Palabras clave: Superscalar; instruction-level parallelism; coprocessor; curve-based cryptography; scalar multiplication; HECC; ECC.

- Efficient Hardware II | Pp. 415-429

Hardware/Software Co-design of Elliptic Curve Cryptography on an 8051 Microcontroller

Manuel Koschuch; Joachim Lechner; Andreas Weitzer; Johann Großschädl; Alexander Szekely; Stefan Tillich; Johannes Wolkerstorfer

8-bit microcontrollers like the 8051 still hold a considerable share of the embedded systems market and dominate in the smart card industry. The performance of 8-bit microcontrollers is often too poor for the implementation of public-key cryptography in software. In this paper we present a minimalist hardware accelerator for enabling elliptic curve cryptography (ECC) on an 8051 microcontroller. We demonstrate the importance of removing system-level performance bottlenecks caused by the transfer of operands between hardware accelerator and external RAM. The integration of a small direct memory access (DMA) unit proves vital to exploit the full potential of the hardware accelerator. Our design allows to perform a scalar multiplication over the binary extension field GF(2^191) in 118 msec at a clock frequency of 12 MHz. Considering performance and hardware cost, our system compares favorably with previous work on similar 8-bit platforms.

Palabras clave: Elliptic Curve; Smart Card; Clock Cycle; Scalar Multiplication; Direct Memory Access.

- Efficient Hardware II | Pp. 430-444

FPGA Implementation of Point Multiplication on Koblitz Curves Using Kleinian Integers

V. S. Dimitrov; K. U. Järvinen; M. J. Jacobson; W. F. Chan; Z. Huang

We describe algorithms for point multiplication on Koblitz curves using multiple-base expansions of the form k = ∑± τ ^ a ( τ –1)^ b and k = ∑± τ ^ a ( τ –1)^ b ( τ ^2 – τ – 1)^ c . We prove that the number of terms in the second type is sublinear in the bit length of k, which leads to the first provably sublinear point multiplication algorithm on Koblitz curves. For the first type, we conjecture that the number of terms is sublinear and provide numerical evidence demonstrating that the number of terms is significantly less than that of τ -adic non-adjacent form expansions. We present details of an innovative FPGA implementation of our algorithm and performance data demonstrating the efficiency of our method.

Palabras clave: Point Multiplication; Greedy Algorithm; Elliptic Curve; Clock Cycle; Elliptic Curf.

- Efficient Hardware II | Pp. 445-459