2010 International Conference on Reconfigurable Computing and FPGAs 2010
DOI: 10.1109/reconfig.2010.38
|View full text |Cite
|
Sign up to set email alerts
|

HCrypt: A Novel Concept of Crypto-processor with Secured Key Management

Abstract: The paper presents a novel concept of processor aimed at symmetric-key cryptographic applications. Its architecture is optimized for implementation of common cryptography tasks. The processor has 128-bit separated data and key registers, dedicated instruction set optimized for key generation and management, embedded cipher, and embedded random number generator. From an architectural point of view, the most important characteristic of the proposed crypto-processor is the physical separation of data and key regi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
2

Year Published

2011
2011
2018
2018

Publication Types

Select...
4
2
1

Relationship

5
2

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 14 publications
0
17
0
2
Order By: Relevance
“…One of solutions would be to use an open source GPP and to include the security module in the processor's data path as was the case with the NIOS II processor. This principle can be also applied to a specific-purpose processor such as that published in Gaspar et al [2010].…”
Section: Discussionmentioning
confidence: 99%
“…One of solutions would be to use an open source GPP and to include the security module in the processor's data path as was the case with the NIOS II processor. This principle can be also applied to a specific-purpose processor such as that published in Gaspar et al [2010].…”
Section: Discussionmentioning
confidence: 99%
“…This approach is very practical, because of the short design time and low costs. However, faster and perhaps more secure implementations could be obtained by creating a specific-purpose processor such as the one published in [13] taking advantage of a reduced instruction set dedicated to cryptographic operations. Nevertheless, this custom processor would have to comply with all the above mentioned separation techniques and the principle is thus generalizable.…”
Section: Discussionmentioning
confidence: 99%
“…Hardware Trojans can use side channels to forward secret information such as a symmetric cipher key [21] from cryptographic hardware implementation [22], [23], even when secure key management is used [24]. Hardware Trojan is also used to cause or amplify side-channel leakage of cryptographic hardware [25]. Note that using side channels to detect a hardware Trojan has also been the subject of several studies [26], [27], [28].…”
Section: Salware Vs Malwarementioning
confidence: 99%