Skip to main content

Structured Design Approach for an Optimal Programmable Synchronous Security Processor

  • Conference paper
Information Security Applications (WISA 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9503))

Included in the following conference series:

Abstract

A new security processor has been recently proposed which accepts the assembly code for arbitrary security algorithms, and executes it efficiently, thanks to its use of a data-flow architecture that distributes arithmetic and logical Function Units (FUs) over a number of Execution Regions (ERs). In this paper, a structured approach is presented to determine the optimal solution of the processor architecture in which one seeks the best combination of the number of ERs and the assignment of 27 FUs to these ERs. In order to cover the huge design space, a structured approach has been adopted which is based on the use of a powerful software simulator and the customization of the Genetic Algorithm NSGA-II for efficient optimization. Numerical results have been obtained and the optimal security processor architecture has been deduced by considering the AES Encryption algorithm as the reference assembly code.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Stallings, W.: Cryptography and Network Security: Principles and Practice, 6th edn. Prentice-Hall, Boston (2013)

    Google Scholar 

  2. Keating, G.: Performance analysis of AES candidates on the 6805 CPU core. In: Proceedings of the Second AES Candidate Conference, Rome, Italy, pp. 109–114 (1999)

    Google Scholar 

  3. Woodbury, A.D., Bailey, D.V., Paar, C.: Elliptic curve cryptography on smart cards without coprocessors. In: Domingo-Ferrer, J., Chan, D., Watson, A. (eds.) Proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications, pp. 71–92. Springer, Heidelberg (2001)

    Google Scholar 

  4. Bertoni, G., Breveglieri, L., Fragneto, P., Macchetti, M., Marchesin, S.: Efficient software implementation of AES on 32-bit platforms. In: Kaliski Jr., Burton S., Koç, Çetin Kaya, Paar, Christof (eds.) CHES 2002. LNCS, vol. 2523. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Atasu, K., Breveglieri, L., Macchetti, M.: Efficient AES implementations for ARM based platforms. In: Proceedings of the 2004 ACM Symposium on Applied Computing, SAC 2004, Cyprus, pp. 841–845 (2004)

    Google Scholar 

  6. Tillich, S., Großschädl, J.: Instruction set extensions for efficient AES implementation on 32-bit processors. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 270–284. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Drutarovsky, M., Varchola, M.: Cryptographic system on a chip based on ACTEL ARM7 soft-core with embedded true random number generator. Design and Diagnostics of Electronic Circuits and Systems, 1–6 (2008)

    Google Scholar 

  8. Verbauwhede, I., Schaumont, P., Kuo, H.: Design and performance testing of a 2.29-GB/s rijndael processor. IEEE J. Solid-State Circ. 38(3), 569–572 (2003)

    Article  Google Scholar 

  9. Hämäläinen, P., Alho, T., Hännikäinen, M., Hämäläinen, T.D.: Design and implementation of low-area and low-power AES encryption hardware core. In: 9th EUROMICRO Conference on Digital System Design: Architectures, Methods and Tools, DSD 2006, pp. 577–583 (2006)

    Google Scholar 

  10. Elbirt, A.J., Yip, W., Chetwynd, B., Paar, C.: An FPGA implementation and performance evaluation of the AES block cipher candidate algorithm finalists. In: The Third Advance Encryption Standard (AES3) Candidate Conference, New York, USA, April 13–14, 2000

    Google Scholar 

  11. Purnaprajna, M., Puttmann, C., Porrmann, M.: Power aware reconfigurable multiprocessor for elliptic curve cryptography. In: Proceedings of the Conference on Design, Automation and Test in Europe (DATE 2008), pp. 1462–1467. Munich, Germany (2008)

    Google Scholar 

  12. Hamalainen, P., Heikkinen, J., Hannikainen, M., Hamalainen, T.D.: Design of transport triggered architecture processors for wireless encryption. In: Proceedings of the 8th Euromicro Conference on Digital System Design, Washington, DC, USA, pp. 144–152 (2005)

    Google Scholar 

  13. Mei, B., Lambrechts, A., Mignolet, J.-Y., Verkest, D., Lauwereins, R.: Architecture exploration for a reconfigurable architecture template. IEEE Des. Test Comput. 22(2), 90–101 (2005)

    Article  Google Scholar 

  14. Ansaloni, G., Bonzini, P., Pozzi, L.: EGRA: A coarse grained reconfigurable architectural template. IEEE Trans. VLSI 19(6), 1062–1074 (2011)

    Article  Google Scholar 

  15. Lu, R., Han, J., Zeng, X.: A low-cost cryptographic processor for security embedded system. In: Asia and South Pacific Design Automation Conference (ASPDAC), Seoul, South Korea, 21-24 January, pp. 113-114 (2008)

    Google Scholar 

  16. Han, L., Han, J., Zeng, X., Lu, R., Zhao, J.: A programmable security processor for cryptography algorithms. In: 9th International Conference on Solid-State and Integrated-Circuit Technology, ICSICT 2008, 20–23 October 2008, pp. 2144–2147 (2008)

    Google Scholar 

  17. Li, C., Jiang, Y., Su, D., Xu, Y., Luo, Z.: A new design of low cost security coprocessor for portable electronic devices. In: 2010 International Conference on Communications and Mobile Computing, (CMC), 12–14 April (2010)

    Google Scholar 

  18. Farouk, H., El-Hadidi, M.T., Abou El Farag, A.: GALS-based LPSP: Implementation of a novel architecture for low power high performance security processors. In: 25th IEEE International Parallel and Distributed Processing Symposium, Anchorage (USA), May 16–20 (2011)

    Google Scholar 

  19. Farouk, H.: Design and Implementation of a Novel Low-Power Security Processor, Ph. D. Thesis, submitted to Department of Electronics and Electrical Communication Engineering, Cairo University (2011)

    Google Scholar 

  20. Corporaal, H.: Design of transport triggered architectures. In: Proceedings of the Fourth Great Lakes Symposium on Design Automation of High Performance VLSI Systems. GLSV (1994)

    Google Scholar 

  21. Advanced Encryption Standard (AES), November 2001, Fed. Inf. Process. Standards Pub (2001)

    Google Scholar 

  22. Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multi-objective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182–197 (2002)

    Article  Google Scholar 

Download references

Acknowledgements

This work has been funded by the National Telecommunication Regulatory Authority (NTRA) of Egypt.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hany El-Sayed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

El-Hadidi, M., El-Sayed, H., Aslan, H., Osama, K. (2016). Structured Design Approach for an Optimal Programmable Synchronous Security Processor. In: Kim, Hw., Choi, D. (eds) Information Security Applications. WISA 2015. Lecture Notes in Computer Science(), vol 9503. Springer, Cham. https://doi.org/10.1007/978-3-319-31875-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31875-2_26

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31874-5

  • Online ISBN: 978-3-319-31875-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics