A Vector Approach to Cryptography Implementation

The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptographic applications. Embedded microprocessors have been equipped with bulky and power-consuming co-processors designed to suit particular data sizes. However, flexible cryptographic platforms are more desirable than devices dedicated to a particular cryptographic algorithm as the increasing cost of fabrication chips favors large volume production. This paper proposes a novel approach to embedded cryptography whereby we propose a vector-based general purpose machine capable of implementing a range of cryptographic algorithms. We show that vector processing ideas can be used to perform cryptography in an efficient manner which we believe is appropriate for high performance, flexible and power efficient embedded systems.

[1]  Çetin Kaya Koç,et al.  A Scalable Architecture for Montgomery Multiplication , 1999, CHES.

[2]  Richard M. Russell,et al.  The CRAY-1 computer system , 1978, CACM.

[3]  David A. Patterson,et al.  Computer Architecture: A Quantitative Approach , 1969 .

[4]  P. L. Montgomery Modular multiplication without trial division , 1985 .

[5]  Nigel P. Smart,et al.  Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .

[6]  ÇETIN K. KOÇ,et al.  Montgomery Multiplication in GF(2k) , 1998, Des. Codes Cryptogr..

[7]  Antonio González,et al.  Energy-effective issue logic , 2001, ISCA 2001.

[8]  Christophe Clavier,et al.  Optimal Statistical Power Analysis , 2003, IACR Cryptol. ePrint Arch..

[9]  John Wawrzynek,et al.  Vector microprocessors , 1998 .

[10]  Ruby B. Lee,et al.  Architectural techniques for accelerating subword permutations with repetitions , 2003, IEEE Trans. Very Large Scale Integr. Syst..

[11]  Johann Großschädl,et al.  Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2/sup m/) , 2003, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003.

[12]  Henk Corporaal Microprocessor architectures - from VLIW to TTA , 1997 .

[13]  Nathalie Feyt,et al.  Hardware and Software Symbiosis Helps Smart Card Evolution , 2001, IEEE Micro.

[14]  Alok N. Choudhary,et al.  Flexible software protection using hardware/software codesign techniques , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[15]  Christophe Giraud,et al.  An Implementation of DES and AES, Secure against Some Attacks , 2001, CHES.

[16]  Ian F. Blake,et al.  Elliptic curves in cryptography , 1999 .

[17]  David Naccache,et al.  Cryptographic Hardware and Embedded Systems — CHES 2001 , 2001 .