High performance hardware security components

A considerable amount of recent research has focused on hardware implementations of cryptographic algorithms and protocols because of the higher performance and the better security they provide, compared to software-based implementations. Software-based implementations are more appealing in that the...

Full description

Saved in:
Bibliographic Details
Main Author: Wang, Yi
Other Authors: Douglas Leslis Maskell
Format: Theses and Dissertations
Published: 2008
Subjects:
Online Access:https://hdl.handle.net/10356/2603
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
id sg-ntu-dr.10356-2603
record_format dspace
spelling sg-ntu-dr.10356-26032023-03-04T00:43:55Z High performance hardware security components Wang, Yi Douglas Leslis Maskell School of Computer Engineering DRNTU::Engineering::Computer science and engineering::Hardware::Performance and reliability A considerable amount of recent research has focused on hardware implementations of cryptographic algorithms and protocols because of the higher performance and the better security they provide, compared to software-based implementations. Software-based implementations are more appealing in that they can support a range of different security protocols, whereas hardware implementations are generally developed for a specific protocol. To improve the flexibility of hardware implementations, it would be desirable to be able to support multiple security protocols on the same platform. Thus it would be useful to design a security coprocessor module which is able to unify the arithmetic computations for supporting protocols like Rivest, Shamir, and Adleman (RSA) and Elliptic Curve Cryptosystem (ECC) over Galois fields GF(p) and GF(2p). Additionally, while specialized hardware security components are perceived to provide better security, their widespread use has presented new and different opportunities for cryptanalysis attacks. Rather than trying to break the cryptographic algorithm, attackers are focusing on attacking deficiencies in the hardware implementation. These attacks, called side channel attacks, are a powerful technique for determining sensitive data based on timing measurements, power analysis, fault analysis, etc. Hence, the ability to defend against cryptanalysis of the hardware must also be considered. DOCTOR OF PHILOSOPHY (SCE) 2008-09-17T09:06:06Z 2008-09-17T09:06:06Z 2008 2008 Thesis Wang, Y. (2008). High performance hardware security components. Doctoral thesis, Nanyang Technological University, Singapore. https://hdl.handle.net/10356/2603 10.32657/10356/2603 Nanyang Technological University application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
topic DRNTU::Engineering::Computer science and engineering::Hardware::Performance and reliability
spellingShingle DRNTU::Engineering::Computer science and engineering::Hardware::Performance and reliability
Wang, Yi
High performance hardware security components
description A considerable amount of recent research has focused on hardware implementations of cryptographic algorithms and protocols because of the higher performance and the better security they provide, compared to software-based implementations. Software-based implementations are more appealing in that they can support a range of different security protocols, whereas hardware implementations are generally developed for a specific protocol. To improve the flexibility of hardware implementations, it would be desirable to be able to support multiple security protocols on the same platform. Thus it would be useful to design a security coprocessor module which is able to unify the arithmetic computations for supporting protocols like Rivest, Shamir, and Adleman (RSA) and Elliptic Curve Cryptosystem (ECC) over Galois fields GF(p) and GF(2p). Additionally, while specialized hardware security components are perceived to provide better security, their widespread use has presented new and different opportunities for cryptanalysis attacks. Rather than trying to break the cryptographic algorithm, attackers are focusing on attacking deficiencies in the hardware implementation. These attacks, called side channel attacks, are a powerful technique for determining sensitive data based on timing measurements, power analysis, fault analysis, etc. Hence, the ability to defend against cryptanalysis of the hardware must also be considered.
author2 Douglas Leslis Maskell
author_facet Douglas Leslis Maskell
Wang, Yi
format Theses and Dissertations
author Wang, Yi
author_sort Wang, Yi
title High performance hardware security components
title_short High performance hardware security components
title_full High performance hardware security components
title_fullStr High performance hardware security components
title_full_unstemmed High performance hardware security components
title_sort high performance hardware security components
publishDate 2008
url https://hdl.handle.net/10356/2603
_version_ 1759853954770927616