13
Asymmetric Crypto Asymmetric Crypto - - Processor Processor Core Core Laboratory of Reliable Computing Department of Electrical Engineering National Tsing Hua University Hsinchu, Taiwan Chyr-Pyng Su, Yung-Chang Lin, Chih- Wea Wang, Chih-Tsun Huang and Cheng-Wen Wu

Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Asymmetric CryptoAsymmetric Crypto--Processor Processor CoreCore

Laboratory of Reliable ComputingDepartment of Electrical EngineeringNational Tsing Hua UniversityHsinchu, Taiwan

Chyr-Pyng Su, Yung-Chang Lin, Chih-Wea Wang, Chih-Tsun Huang and

Cheng-Wen Wu

Page 2: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 2

IntroductionIntroductionIntroduction• Data encryption and description play an important

role for digital communication− Secure communication− Authentication− E-commence− Remote access− Wireless networking

• RSA is a well-known public key cryptography− Asymmetric cryptography

Page 3: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 3

Symmetric CryptographySymmetric CryptographySymmetric Cryptography

AENCRYPT

PLAINTEXTPLAINTEXT BDECRYPT

PLAINTEXTPLAINTEXTCIPHERTEXTCIPHERTEXT

SecretSecretKEYKEY

ADECRYPT

PLAINTEXTPLAINTEXT BENCRYPT

PLAINTEXTPLAINTEXTCIPHERTEXTCIPHERTEXT

A B

Page 4: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 4

Asymmetric CryptographyAsymmetric CryptographyAsymmetric Cryptography

AENCRYPT

PLAINTEXTPLAINTEXT BDECRYPT

PLAINTEXTPLAINTEXTCIPHERTEXTCIPHERTEXT

BB’’s PUBLICs PUBLICKEYKEY

BB’’s PRIVATEs PRIVATEKEYKEY

ADECRYPT

PLAINTEXTPLAINTEXT BENCRYPT

PLAINTEXTPLAINTEXTCIPHERTEXTCIPHERTEXT

A UNIQUE PAIRING, BUTIMPOSSIBLE TO DEDUCE

FROM EACH OTHER!

Data encryptionData encryption

Digital signatureDigital signature

A B

Page 5: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 5

RSA Asymmetric AlgorithmRSA Asymmetric AlgorithmRSA Asymmetric Algorithm• The relation between ciphertext and a message can be

expressed as follows where [E,N] is public key and [D,N] is digital signature key.

• The encryption and decryption is identical− Modular multiplication

• The larger the key, the safer the system

Ciphertext C = ME (mod N)Message M = CD (mod N)

N is a large number, for example, 512 or 1024 bitsN is a large number, for example, 512 or 1024 bitsN is a large number, for example, 512 or 1024 bits

Page 6: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 6

Asymmetric Crypto-Processor CoreAsymmetric CryptoAsymmetric Crypto--Processor CoreProcessor Core• The asymmetric crypto-processor core (ACP) is

designed to work with 8051-compatible (8-bit) processor

• A load/store machine, with simple memory-mapping interface

• Word-based modular multiplication

• 16-bit datapath

• Various key size

Page 7: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 7

Smart Card ApplicationSmart Card ApplicationSmart Card Application

Microprocessor

RAM

Flash

EEPROM

ISO 7816 Random number generator

Asymmetric

crypto-processor

RSAcrypto-processor

core

MMU

Controller

IOinterface

Magnetic strip

Page 8: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 8

Instruction SetInstruction SetInstruction Set

Page 9: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 9

Overall ArchitectureOverall ArchitectureOverall Architecture

Page 10: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 10

Test ChipTest ChipTest Chip

10nsCritical path

34kGate count

1.7×1.8 mm2Die area

DIP 28 pinsPackage

0.35μmTechnology

A built-in self-diagnosis (BISD) to test 8 memory coresFull-scan: 6 scan chains, each with 123 scan registersA builtA built--in selfin self--diagnosis (BISD) to test 8 memory coresdiagnosis (BISD) to test 8 memory coresFullFull--scan: 6 scan chains, each with 123 scan registersscan: 6 scan chains, each with 123 scan registers

Page 11: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 11

ComparisonComparisonComparison

13.1k

4.5k

77k

76k

74k

Gate Count

79k

18.6k

512k

174.8k

286k

NB

No2.3100k100M0.6μμμμm0.51M512Su

79k

10.5k

289k

164k

Baud

Rate

Yes6100M0.35μμμμm0.81M512Our design (16-bit)

Yes2.37125M0.6μμμμm6.5M512Hsieh (8-bit)

No6.7300M0.6μμμμm0.53M512Hong

No3.9125M0.6μμμμm0.39M512Yang

Scalable

Key SizeααααClockTech.#. of clocks

/512 bitsKey Size

NB is normalized baud rate.αααα is NB / gate count.

Page 12: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 12

SummarySummarySummary• An RSA cryptography engine with small area

overhead and high speed is implemented

• Scalable architecture for various key size

• The width of datapath is extendable

Page 13: Asymmetric Crypto-Processor Core - UCLAcadlab.cs.ucla.edu/icsoc/protected-dir/june_pdf_presentations/cheng... · RSA Asymmetric Algorithm • The relation between ciphertext and a

Chih-Tsun Huang Jun 23 2001 13

Future WorksFuture WorksFuture Works• Network security processor

− RSA cryptography (public key)− Random number generator− AES, 3DES, and so on (secret key)

DataManipulation

Module

Finite FieldALU

RN Module

Network Security Processor Core

ACP Engine