Skip to main content
Log in

Secure evolvable hardware for public-key cryptosystems

  • Special Issue
  • Published:
New Generation Computing Aims and scope Submit manuscript

Abstract

In this paper, genetic programming is used as an alternative means to automatically generate secure and minimal hardware designs of public-key cryptosystems such as the RSA cryptosystem. We evolve optimal hardware circuits for modular exponentiation, which is a cornerstone operation in many public-key cryptographic system. The evolved circuits minimize both space (i.e. required gate number) and time (i.e. encryption and decryption time). The evolved designs are shielded against side-channel leakage and hence secure. The structure of the cryptographic circuit is random and so the private key cannot be deduced using known attacks. We compare our results against existing well-known designs, which were produced by human designers based on the binary method.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Aho, A.V., Ravi, S. and Ullman, J.D., “Compilers: Principles, Techniques and Tools,” Addison-Wesley, 1986.

  2. Blum, T. and Paar, C., “Montgomery Modular Exponentiation on Reconfigurable Hardware,” inProc. of the 14th. IEEE Symposium on Computer Arithmetic, Australia, 1999.

  3. Brickell, E.F., “A Survey of Hardware Implementation of RSA,” inAdvances in Cryptology, LNCS (Brassard, G. ed.),435, pp. 368–370, Springer-Verlag, 1989.

  4. Dabbish, E.A. and Sloan, R.H., “Power Analysis Attacks of Modular Exponentiation in Smartcards,” inProc. Cryptographic Hardware and Embedded Systems, LNCS, 1717, pp. 144–157, 1999.

  5. Ercegovac, M.D., Lang, T. and Moreno, J.H., “Introduction to Digital Systems,” John Wiley, 1999.

  6. Fonseca, C.M. and Fleming, P.J., “An Overview of Evolutionary Algorithms in Multi-objective Optimization,”Evolutionary Computation, 3, 1, pp. 1–16, 1995.

    Article  Google Scholar 

  7. Gordon, D.M., “A Survey of Fast Exponentiation Methods,”Journal of Algorithms, 27, pp. 129–146, 1998.

    Article  MATH  MathSciNet  Google Scholar 

  8. Haupt, R.L. and Haupt, S.E., “Practical Genetic Algorithms,” John Wiley and Sons, 1998.

  9. Karnaugh, M., “A Map Method for Synthesis of Combinational Logic Circuits,”Transactions of the AIEE, Communications and Electronics, 72, 1, pp. 593–599, November 1953.

    MathSciNet  Google Scholar 

  10. Koza, J.R., “Genetic Programming,” MIT Press, 1992.

  11. Mccluskey, E.J., “Minimisation of Boolean Functions,”Bell Systems Technical Journal, 35, 5, 1417–1444, November 1956.

    MathSciNet  Google Scholar 

  12. Menezes, A.J., Van Oorschot, P.C. and Scott A. Vanstone, “Handbook of Applied Cryptography,” CRC Press, 1996.

  13. Messerges, T.S., Dabbish, E.A. and Sloan, R.H., ”Power Analysis Attacks of Modular Exponentiation in Smartcards,” inProc. Cryptographic Hardware and Embedded Systems, LNCS, 1717, pp. 144–157, 1999.

  14. Miller, J.F., Job, D. and Vassilev, V.K., “Principles in the Evolutionary Design of Digital Circuits,”Journal of Genetic Programming and Evolvable Machines, 1, pp. 7–35, 2000.

    Article  MATH  Google Scholar 

  15. Nedjah, N. and Mourelle, L.M., “Two Hardware Implementations for the Montgomery Multiplication: Sequential vs. Parallel,” inProc. of the 15th. Symposium on Integrated Circuits and Systems Design, Porto Alegre, RS, Brazil, (Reis R. and Calazans, N. Eds.), IEEE Computer Society Press, pp. 3–8, 2002.

  16. Nedjah, N. and Mourelle, L.M., “Reconfigurable Hardware Implementation of Montgomery Modular Multiplication and Parallel Binary Exponentiation,” inProc. of the Euromicro Symposium on Digital System Design, IEEE Computer Society Press, pp. 226–235, Dortmund, Germany, 2002.

  17. Poli, R., “Efficient Evolution of Parallel Binary Multipliers and Continuous Symbolic Regression Expressions with Sub-machine Code GP,”Technical Report CSRP-9819, University of Birmingham, School of Computer Science, December 1998.

  18. Rivest, R., Shamir, A. and Adleman, L., “A Method for Obtaining Digital Signature and Public-key Cryptosystems,”Communications of the ACM, 21, pp. 120–126, 1978.

    Article  MATH  MathSciNet  Google Scholar 

  19. Rhyne, V.T., “Fundamentals of Digital Systems Design (Kuo, F.F. ed.),” Prentice-Hall Electrical Engineering Series, 1973.

  20. Tiountchik, A., “Systolic Modular Exponentiation via Montgomery Algorithm,”Electronic Letters, 34, 9, pp. 874–875, 1998.

    Article  Google Scholar 

  21. Turton, B.C.H., “Extending Quine-McCluskey for Exclusive-or Logic Synthesis,”IEEE Transactions on Education, 39, 1, pp. 81–85, February 1996.

    Article  Google Scholar 

  22. XILINXTM, Inc., foundation Series Software, http://www.xilinx.com, 2002.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadia Nedjah.

Additional information

Nadia Nedjah, Ph.D.: She is an associate professor in the Department of Electronics Engineering and Telecommunications at the Faculty of Engineering, State University of Rio de Janeiro, Brazil. Her research interests include functional programming, embedded systems and reconfigurable hardware design as well as cryptography. Nedjah received her Ph.D. in Computation from the University of Manchester — Institute of Science and Technology (UMIST), England, her M.S.c. in System Engineering and Computation from the University of Annaba, Algeria and her Engineerind degree in Computer Science also from the University of Annaba, Algeria.

Luiza de Macedo Mourelle, Ph.D.: She is an associate professor in the Department of System Engineering and Computation at the Faculty of Engineering, State University of Rio de Janeiro, Brazil. Her research interests include computer architecture, embedded systems design, hardware/software codesign and reconfigurable hardware. She received her Ph.D. in Computation from the University of Manchester — Institute of Science and Technology (UMIST), England, her M.S.c. in System Engineering and Computation from the Federal University of Rio de Janeiro (UFRJ), Brazil and her Engineering degree in Electronics also from UFRJ, Brazil.

About this article

Cite this article

Nedjah, N., de Macedo Mourelle, L. Secure evolvable hardware for public-key cryptosystems. New Gener Comput 23, 259–275 (2005). https://doi.org/10.1007/BF03037659

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03037659

Key words

Navigation