This thesis proposes a hardware implementation of multivariate quadratic quasigroup (MQQ) public key cryptosystem that achieves decryption throughput of 399 Mbps on a Xilinx Virtex-5 field programable gate array (FPGA), which is running on 249.4 MHz. The encryption throughput of MQQ implementation achieves 44.27 Gbps on four Xilinx Virtex-5 chips that are running on 276.7 MHz. In addition for, the compact hardware implementation of Blue Midnight Wish (BMW) hash function, the thesis introduces a compact processing element on FPGA. Using the proposed processing element (PE), the BMW-256 has been implemented in just 51 FPGA slices achieving a throughput of 68.71 Mbps, and BMW-512 in just 105 slices, achieving a throughput of 112.18 Mbps. The PE requires the use of block RAM memory for storing the internal structure of hash functions, as well as for the PE instruction logic. Further, the thesis proposes FPGA implementations of a new transpose memory structure to be used in high throughput signal processing architectures. Simulation results show that the proposed memory allows a saving of 8 clock cycles per 8x8 block of discrete cosine transform (DCT) coefficients, compared to traditional implementations previously proposed by others. An important observation made during the design of this system is that it is easily integrable as an adaptive memory unit into modern coarse grained reconfigurable architectures, and upon modification can serve the dual role of a scratchpad register file as well as transpose memory during normal and digital signal processing (DSP) applications, respectively. Finally, the thesis proposes a robust scheme that uses digital invisible watermarking and hashing to protect the authorship of digital content, and provide resistance against malicious manipulation of multimedia content.
[1]
William E. Burr,et al.
Cryptographic hash standards: where do we go from here?
,
2006,
IEEE Security & Privacy.
[2]
Stefan Lucks,et al.
Design Principles for Iterated Hash Functions
,
2004,
IACR Cryptol. ePrint Arch..
[3]
Mohamed El-Hadedy,et al.
Low Area Implementation of the Hash Function “Blue Midnight Wish 256” for FPGA Platforms
,
2009,
2009 International Conference on Intelligent Networking and Collaborative Systems.
[4]
Antoine Joux,et al.
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
,
2004,
CRYPTO.
[5]
Odysseas G. Koufopavlou,et al.
Implementation of the SHA-2 Hash Family Standard Using FPGAs
,
2005,
The Journal of Supercomputing.
[6]
Søren S. Thomsen.
Pseudo-cryptanalysis of the Original Blue Midnight Wish
,
2010,
IACR Cryptol. ePrint Arch..
[7]
Máire O'Neill,et al.
Efficient single-chip implementation of SHA-384 and SHA-512
,
2002,
2002 IEEE International Conference on Field-Programmable Technology, 2002. (FPT). Proceedings..
[8]
Stefan Lucks,et al.
A Failure-Friendly Design Principle for Hash Functions
,
2005,
ASIACRYPT.