High performance hardware security components
A considerable amount of recent research has focused on hardware implementations of cryptographic algorithms and protocols because of the higher performance and the better security they provide, compared to software-based implementations. Software-based implementations are more appealing in that the...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Published: |
2008
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/2603 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
id |
sg-ntu-dr.10356-2603 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-26032023-03-04T00:43:55Z High performance hardware security components Wang, Yi Douglas Leslis Maskell School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Hardware::Performance and reliability A considerable amount of recent research has focused on hardware implementations of cryptographic algorithms and protocols because of the higher performance and the better security they provide, compared to software-based implementations. Software-based implementations are more appealing in that they can support a range of different security protocols, whereas hardware implementations are generally developed for a specific protocol. To improve the flexibility of hardware implementations, it would be desirable to be able to support multiple security protocols on the same platform. Thus it would be useful to design a security coprocessor module which is able to unify the arithmetic computations for supporting protocols like Rivest, Shamir, and Adleman (RSA) and Elliptic Curve Cryptosystem (ECC) over Galois fields GF(p) and GF(2p). Additionally, while specialized hardware security components are perceived to provide better security, their widespread use has presented new and different opportunities for cryptanalysis attacks. Rather than trying to break the cryptographic algorithm, attackers are focusing on attacking deficiencies in the hardware implementation. These attacks, called side channel attacks, are a powerful technique for determining sensitive data based on timing measurements, power analysis, fault analysis, etc. Hence, the ability to defend against cryptanalysis of the hardware must also be considered. DOCTOR OF PHILOSOPHY (SCE) 2008-09-17T09:06:06Z 2008-09-17T09:06:06Z 2008 2008 Thesis Wang, Y. (2008). High performance hardware security components. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/2603 10.32657/10356/2603 Nanyang Technological University application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
topic |
DRNTU::Engineering::Computer science and engineering::Hardware::Performance and reliability |
spellingShingle |
DRNTU::Engineering::Computer science and engineering::Hardware::Performance and reliability Wang, Yi High performance hardware security components |
description |
A considerable amount of recent research has focused on hardware implementations of cryptographic algorithms and protocols because of the higher performance and the better security they provide, compared to software-based implementations. Software-based implementations are more appealing in that they can support a range of different security protocols, whereas hardware implementations are generally developed for a specific protocol. To improve the flexibility of hardware implementations, it would be desirable to be able to support multiple security protocols on the same platform. Thus it would be useful to design a security coprocessor module which is able to unify the arithmetic computations for supporting protocols like Rivest, Shamir, and Adleman (RSA) and Elliptic Curve Cryptosystem (ECC) over Galois fields GF(p) and GF(2p). Additionally, while specialized hardware security components are perceived to provide better security, their widespread use has presented new and different opportunities for cryptanalysis attacks. Rather than trying to break the cryptographic algorithm, attackers are focusing on attacking deficiencies in the hardware implementation. These attacks, called side channel attacks, are a powerful technique for determining sensitive data based on timing measurements, power analysis, fault analysis, etc. Hence, the ability to defend against cryptanalysis of the hardware must also be considered. |
author2 |
Douglas Leslis Maskell |
author_facet |
Douglas Leslis Maskell Wang, Yi |
format |
Theses and Dissertations |
author |
Wang, Yi |
author_sort |
Wang, Yi |
title |
High performance hardware security components |
title_short |
High performance hardware security components |
title_full |
High performance hardware security components |
title_fullStr |
High performance hardware security components |
title_full_unstemmed |
High performance hardware security components |
title_sort |
high performance hardware security components |
publishDate |
2008 |
url |
https://hdl.handle.net/10356/2603 |
_version_ |
1759853954770927616 |