Abstract
Security processors are used to implement cryptographic algorithmswith high throughput and/or low energy consumption constraints. The designof these processors is a balancing act between flexibility and energy consumption.The target is to create a processor with just enough programmability to covera set of algorithms—an application domain. This paper proposes GEZEL,a design environment consisting of a design language and an implementationmethodology that can be used for such domain specific processors. We use thesecurity domain as driver, and discuss the impact of the domain on the targetarchitecture. We also present a methodology to create, refine and verify asecurity processor.
Similar content being viewed by others
References
Berry, G. The Foundations of Esterel Proof, Language and Interaction: Essays in Honour of Robin Milner. MIT Press, 2000.
Bolsens, I., H. De Man, B. Lin, K. Van Rompaey, S. Vercauteren, and D. Verkest. Hardware/Software Co-Design of Digital Telecommunication Systems. In Proceedings of the IEEE, vol. 85, no.3, pp. 391–418, March 1997.
Dehon, A. and J. Wawrzynek. Reconfigurable Computing: What, Why, and Implications for Design Automation, Proceedings of the Design Automation Conference 1999, June 1999.
Dewin, E. and B. Preneel. Elliptic Curve Public-Key Cryptosystems: An Introduction. LNCS 1528, Springer-Verlag, June 1997, pp. 131–141.
Dyer, J., M. Linemann, R. Perez, L. van Doorn, S. Smith, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEE Computer, pp. 57–67, Oct. 2001.
Gajski, D., F. Vahid, S. Narayan, and J. Gong. Specification and Design of Embedded Systems. Prentice Hall, Englewood Cliffs, NJ, 1994.
Gajski, D., J. Zhu, R. Doemer, A. Gerstlauer, and S. Zhao. Spec C: Specification Language and Methodology. Kluwer Academic Publishers, Boston, 2000.
Goodman, J., and A. P. Chandrakasan. An Energy-Efficient Reconfigurable Public-Key Cryptography Processor. IEEE Journal of Solid-State Circuits, pp.1808–1820, Nov. 2001.
Hankerson, D. Performance Comparison of Elliptic Curve Systems in Software. In Proceedings of the Fifth Workshop on Elliptic Curve Cryptography 2001, Ontario, Oct. 2001.
Harel, D. Statecharts: A Visual Formalism for Complex Systems. Sci. Comput. Programming, vol. 8, 1987, pp. 231–74.
Hartenstein, R. A Decade of Reconfigurable Computing: A Visionary Perspective. In Proceedings of the Design Automation and Test European Conference 2001, Munchen, March 2001.
Hoffmann, A., A. Nohl, G. Braun, O. Schliebusch, T. Kogel, and H. Meyr. A Novel Methodology for the Design of Application Specific Instruction Set Processors (ASIP) Using a Machine Description Language. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Nov. 2001.
IEEE P1363/2000: Standard Specifications for Public Key Cryptography. http://www.ieee.org.
IETF: SSH Protocol Architecture. http://www.ietf.org/internet-drafts/draft-ietf-secsh-architecture-09.txt, July 20, 2001.
Janssens, S., J. Thomas, W. Borremans, P. Gijsels, I. Verbauwhede, F. Vercauteren, and B. Preneel. Hardware/Software Co-Design of an Elliptic Curve Public-Key Cryptossystem. In Proceedings of the 2001 IEEE Workshop on Signal Processing Systems, pp. 209–216, Antwerpen, 2001.
Kienhuis, B. Domain Space Exploration of Stream Based Architectures for Dataflow Applications Ph.D. thesis, TU Delft, 1999.
Kienhuis, B., and Ed. F. Depettere. Modeling Stream-Based Applications Using the SBF Model of Computation. In Proceedings of the 2001 IEEE Workshop on Signal Processing Systems, pp. 209–216, Antwerpen, 2001.
Kim, E. The MIT Lightweight Languages Workshop. Dr. Dobb's Journal, CMP Publishers, Feb. 2002.
Kuo, H., I. Verbauwhede, and P. Schaumont. A 2.29 Gbits/sec, 56mW Non-Pipelined Rijndael A ES Encryption IC in a 1.8 V, 0.18 mm CMOS Technology. In Proceedings of the IEEE Custom Integrated Circuits Conference 2002, Orlando, May 2002.
Lanneer, D., J. Van Praet, A. Kifli, K. Schoofs, W. Geurts, F. Thoen, and G. Goossens. CHESS: Retargetable Code Generation for Embedded DSP Processors. Code Generation for Embedded Processors. P. Marwedel, ed., Kluwer Academic Publishers, 1995.
Lee, E. A. Overview of the Ptolemy Project Technical Memorandum UCB/ERL M01/11, University of California, Berkeley, March 6, 2001.
Menezes, A., P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
NIST. Federal Information Processing Standards (FIPS) PUB 186–2 Digital Signature Standard. http://www.nist.gov/aes/, Jan. 27, 2000.
NIST. Federal Information Processing Standards (FIPS) PUB 197 Advanced Encryption Standard. http://www.nist.gov/aes/, Nov. 26, 2001.
Ogrenci, S., E. Bozorgzadeh, R. Kastner, and M. Sarrafzadeh. SPS: A Strategically Programmable System. In Proceedings of the Reconfigurable Architectures Workshop 2001, San Francisco, April 2001.
Proudfoot, K., W. R. Mark, S. Tzvetkov, and P. Hanrahan. A Real-Time Procedural Shading System for Programmable Graphics Hardware. In Proceedings of the 28th International Conference on Computer Graphics and Interactive Techniques (SIGGRAPH 2001), Los Angeles, 2001.
Schaumont, P., I. Verbauwhede, K. Keutzer, and M. Sarrafzadeh. A Quick Safari Through the Reconfiguration Hierarchy. In Proceedings of the Design Automation Conference 2001, LasVegas, June 2001.
Swan, S. An Introduction to System Levtexnansi.encel Modeling in SystemC 2.0, http://www.systemc.org.
Thiele, L., K. Strehl, D. Ziegenbein, R. Ernst, and J. Teich. FunState—An Internal Design Representation for Codesign. In Proceedings of the 1999 International Conference on Computer Aided Design, San Jose, 1999.
Verkest, D., W. Eberle, P. Schaumont, B. Gyselinckx, and S. Vernalde. C++ Based System Design of a 72Mb/s OFDM Transceiver forWireless LAN. In Proceedings of the Custom Integrated Circuits Conference 2001, San Diego, 2001.
Whiting, D., B. Schneier, and S. Bellovin. AES Key Agility Issues in High Speed IPsec Implementations. Public Comments on AES Candidate Algorithms Round 2, http://www.nist.gov/aes.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Schaumont, P., Verbauwhede, I. Domain Specific Tools and Methods for Application in Security Processor Design. Design Automation for Embedded Systems 7, 365–383 (2002). https://doi.org/10.1023/A:1020363323869
Issue Date:
DOI: https://doi.org/10.1023/A:1020363323869