Skip to main content
Log in

Domain Specific Tools and Methods for Application in Security Processor Design

  • Published:
Design Automation for Embedded Systems Aims and scope Submit manuscript

Abstract

Security processors are used to implement cryptographic algorithmswith high throughput and/or low energy consumption constraints. The designof these processors is a balancing act between flexibility and energy consumption.The target is to create a processor with just enough programmability to covera set of algorithms—an application domain. This paper proposes GEZEL,a design environment consisting of a design language and an implementationmethodology that can be used for such domain specific processors. We use thesecurity domain as driver, and discuss the impact of the domain on the targetarchitecture. We also present a methodology to create, refine and verify asecurity processor.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Berry, G. The Foundations of Esterel Proof, Language and Interaction: Essays in Honour of Robin Milner. MIT Press, 2000.

  2. Bolsens, I., H. De Man, B. Lin, K. Van Rompaey, S. Vercauteren, and D. Verkest. Hardware/Software Co-Design of Digital Telecommunication Systems. In Proceedings of the IEEE, vol. 85, no.3, pp. 391–418, March 1997.

    Google Scholar 

  3. Dehon, A. and J. Wawrzynek. Reconfigurable Computing: What, Why, and Implications for Design Automation, Proceedings of the Design Automation Conference 1999, June 1999.

  4. Dewin, E. and B. Preneel. Elliptic Curve Public-Key Cryptosystems: An Introduction. LNCS 1528, Springer-Verlag, June 1997, pp. 131–141.

  5. Dyer, J., M. Linemann, R. Perez, L. van Doorn, S. Smith, and S. Weingart. Building the IBM 4758 Secure Coprocessor. IEEE Computer, pp. 57–67, Oct. 2001.

  6. Gajski, D., F. Vahid, S. Narayan, and J. Gong. Specification and Design of Embedded Systems. Prentice Hall, Englewood Cliffs, NJ, 1994.

    Google Scholar 

  7. Gajski, D., J. Zhu, R. Doemer, A. Gerstlauer, and S. Zhao. Spec C: Specification Language and Methodology. Kluwer Academic Publishers, Boston, 2000.

    Google Scholar 

  8. Goodman, J., and A. P. Chandrakasan. An Energy-Efficient Reconfigurable Public-Key Cryptography Processor. IEEE Journal of Solid-State Circuits, pp.1808–1820, Nov. 2001.

  9. Hankerson, D. Performance Comparison of Elliptic Curve Systems in Software. In Proceedings of the Fifth Workshop on Elliptic Curve Cryptography 2001, Ontario, Oct. 2001.

  10. Harel, D. Statecharts: A Visual Formalism for Complex Systems. Sci. Comput. Programming, vol. 8, 1987, pp. 231–74.

    Google Scholar 

  11. Hartenstein, R. A Decade of Reconfigurable Computing: A Visionary Perspective. In Proceedings of the Design Automation and Test European Conference 2001, Munchen, March 2001.

  12. Hoffmann, A., A. Nohl, G. Braun, O. Schliebusch, T. Kogel, and H. Meyr. A Novel Methodology for the Design of Application Specific Instruction Set Processors (ASIP) Using a Machine Description Language. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), Nov. 2001.

  13. IEEE P1363/2000: Standard Specifications for Public Key Cryptography. http://www.ieee.org.

  14. IETF: SSH Protocol Architecture. http://www.ietf.org/internet-drafts/draft-ietf-secsh-architecture-09.txt, July 20, 2001.

  15. Janssens, S., J. Thomas, W. Borremans, P. Gijsels, I. Verbauwhede, F. Vercauteren, and B. Preneel. Hardware/Software Co-Design of an Elliptic Curve Public-Key Cryptossystem. In Proceedings of the 2001 IEEE Workshop on Signal Processing Systems, pp. 209–216, Antwerpen, 2001.

  16. Kienhuis, B. Domain Space Exploration of Stream Based Architectures for Dataflow Applications Ph.D. thesis, TU Delft, 1999.

  17. Kienhuis, B., and Ed. F. Depettere. Modeling Stream-Based Applications Using the SBF Model of Computation. In Proceedings of the 2001 IEEE Workshop on Signal Processing Systems, pp. 209–216, Antwerpen, 2001.

  18. Kim, E. The MIT Lightweight Languages Workshop. Dr. Dobb's Journal, CMP Publishers, Feb. 2002.

  19. Kuo, H., I. Verbauwhede, and P. Schaumont. A 2.29 Gbits/sec, 56mW Non-Pipelined Rijndael A ES Encryption IC in a 1.8 V, 0.18 mm CMOS Technology. In Proceedings of the IEEE Custom Integrated Circuits Conference 2002, Orlando, May 2002.

  20. Lanneer, D., J. Van Praet, A. Kifli, K. Schoofs, W. Geurts, F. Thoen, and G. Goossens. CHESS: Retargetable Code Generation for Embedded DSP Processors. Code Generation for Embedded Processors. P. Marwedel, ed., Kluwer Academic Publishers, 1995.

  21. Lee, E. A. Overview of the Ptolemy Project Technical Memorandum UCB/ERL M01/11, University of California, Berkeley, March 6, 2001.

    Google Scholar 

  22. Menezes, A., P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.

  23. NIST. Federal Information Processing Standards (FIPS) PUB 186–2 Digital Signature Standard. http://www.nist.gov/aes/, Jan. 27, 2000.

  24. NIST. Federal Information Processing Standards (FIPS) PUB 197 Advanced Encryption Standard. http://www.nist.gov/aes/, Nov. 26, 2001.

  25. Ogrenci, S., E. Bozorgzadeh, R. Kastner, and M. Sarrafzadeh. SPS: A Strategically Programmable System. In Proceedings of the Reconfigurable Architectures Workshop 2001, San Francisco, April 2001.

  26. Proudfoot, K., W. R. Mark, S. Tzvetkov, and P. Hanrahan. A Real-Time Procedural Shading System for Programmable Graphics Hardware. In Proceedings of the 28th International Conference on Computer Graphics and Interactive Techniques (SIGGRAPH 2001), Los Angeles, 2001.

  27. Schaumont, P., I. Verbauwhede, K. Keutzer, and M. Sarrafzadeh. A Quick Safari Through the Reconfiguration Hierarchy. In Proceedings of the Design Automation Conference 2001, LasVegas, June 2001.

  28. Swan, S. An Introduction to System Levtexnansi.encel Modeling in SystemC 2.0, http://www.systemc.org.

  29. Thiele, L., K. Strehl, D. Ziegenbein, R. Ernst, and J. Teich. FunState—An Internal Design Representation for Codesign. In Proceedings of the 1999 International Conference on Computer Aided Design, San Jose, 1999.

  30. Verkest, D., W. Eberle, P. Schaumont, B. Gyselinckx, and S. Vernalde. C++ Based System Design of a 72Mb/s OFDM Transceiver forWireless LAN. In Proceedings of the Custom Integrated Circuits Conference 2001, San Diego, 2001.

  31. Whiting, D., B. Schneier, and S. Bellovin. AES Key Agility Issues in High Speed IPsec Implementations. Public Comments on AES Candidate Algorithms Round 2, http://www.nist.gov/aes.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Schaumont, P., Verbauwhede, I. Domain Specific Tools and Methods for Application in Security Processor Design. Design Automation for Embedded Systems 7, 365–383 (2002). https://doi.org/10.1023/A:1020363323869

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1020363323869

Navigation