Abstract
In this paper, we evolve digital circuits for public-key cryptosystems. The methodology used is based on genetic programming. The evolutionary process attempts to minimise the hardware area required to implement modular multiplication and exponentiation. It does so while it also attempts to optimise the encryption and decryption time, by considering multiple objectives. We show that the evolved designs are shielded against side-channel leakage. We compare our results against existing and well-known designs, which were produced by human designers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signature and public-key cryptosystems. Communications of the ACM 21, 120–126 (1978)
Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Power analysis attacks of modular exponentiation in smartcards. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 144–157. Springer, Heidelberg (1999)
Koza, J.R.: Genetic Programming. MIT Press, Cambridge (1992)
Nedjah, N., Ajith, A., Mourelle, L.M. (eds.): Genetic systems programming: theory & practice. Studies in Computational Intelligence Book Series, vol. 13. Springer, Heidelberg, Berlin (2006)
Nedjah, N., Mourelle, L.M.: Two hardware implementations for the Montgomery multiplication: sequential vs. parallel. In: Proc. of 15th Symposium on Integrated Circuits and Systems Design, Porto Alegre, Brazil, pp. 3–8. IEEE Computer Society, Los Alamitos (2002)
Nedjah, N., Mourelle, L.M. (eds.): New trends in cryptographic systems, Nova Science, Hauppauge, NY. Intelligent Systems Engineering Book Series (2006)
Brickell, E.F.: A survey of hardware implementation of RSA. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 368–370. Springer, Heidelberg (1990)
Blum, T., Paar, C.: Montgomery modular exponentiation on reconfigurable hardware. In: Proc. of the 14th IEEE Symposium on Computer Arithmetic, Australia (1999)
Tiountchik, A.: Systolic modular exponentiation via Montgomery algorithm. Electronic Letters 34(9), 874–875 (1998)
Fonseca, C.M., Fleming, P.J.: An overview of evolutionary algorithms in multi-objective optimisation. Evolutionary Computation 3(1), 1–16
Nedjah, N., Mourelle, L.M.: Real-World Multi-objective System Engineering, Intelligent Systems Engineering Book Series, Nova Science, Hauppauge, NY (2005)
Nedjah, N., Mourelle, L.M.: Reconfigurable hardware implementation of Montgomery modular multiplication and parallel binary exponentiation. In: Proc. of Euromicro Symposium on Digital System Design, Dortmund, Germany, pp. 226–235. IEEE Computer Society, Los Alamitos (2002)
XilinxTM, Inc., http://www.xilinx.com
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nedjah, N., de Macedo Mourelle, L. (2008). Evolutionary Public-Key Cryptographic Circuits. In: Nguyen, N.T., Borzemski, L., Grzech, A., Ali, M. (eds) New Frontiers in Applied Artificial Intelligence. IEA/AIE 2008. Lecture Notes in Computer Science(), vol 5027. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69052-8_58
Download citation
DOI: https://doi.org/10.1007/978-3-540-69052-8_58
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69045-0
Online ISBN: 978-3-540-69052-8
eBook Packages: Computer ScienceComputer Science (R0)