Hardware Design of an Advanced-Feature Cryptographic Tile within the European Processor Initiative
نویسندگان
چکیده
This work describes the hardware implementation of a cryptographic accelerators suite, named Crypto-Tile, in framework European Processor Initiative (EPI) project. The EPI project traced roadmap to develop first family low-power processors with design fully made Europe, for Big Data, supercomputers and automotive. Each coprocessors Crypto-Tile is dedicated specific algorithms, offering functions symmetric public-key cryptography, computation digests, generation random numbers, Post-Quantum cryptography. performances each coprocessor outperform other available solutions, innovative hardware-native services, such as key management, clock randomisation access privilege mechanisms. system has been synthesised on 7 nm standard-cell technology, being Cryptoprocessor be characterised an advanced silicon technology. post-synthesis netlist employed assess resistance power analysis side-channel attacks. Finally, demoboard implemented, integrating RISC-V softcore processor module, drivers abstraction layer, bare-metal applications Linux kernel C language have developed. we exploited them compare terms execution speed hardware-accelerated algorithms against software-only solutions.
منابع مشابه
Advanced processor design using hardware description language AIDL
| In order to design advanced processors in a short time, designers must simulate their designs and re ect the results to the designs at the very early stages. However, conventional hardware description languages (HDLs) do not have enough ability to describe designs easily and accurately at these stages. Then, we have proposed a new hardware description language AIDL. In this paper, in order to...
متن کاملOptimizations in the Design of Cryptographic Hardware
The architectures that are used in the increasingly popular area of cryptography are discussed. In the design of cryptographic systems optimization in speed and area are important for surpassing acceptable standards. Many methods have been explored in the literature with regard to optimizations in speed. Although area is not as critical as the aforementioned constraint, it is closely related to...
متن کاملSoftware/Hardware Co-Design of Efficient and Secure Cryptographic Hardware
Most cryptographic systems are based on the modular exponentiation to perform the non-linear scrambling operation of data. It is performed using successive modular multiplications, which are time consuming for large operands. Accelerating cryptography needs optimising the time consumed by a single modular multiplication and/or reducing the total number of modular multiplications performed. Usin...
متن کاملAn Adaptive Cryptographic and Embedded System Design with Hardware Virtualization
This work proposes an adaptive cryptographic and embedded system (ACES) design that can adapt its hardware and software functionalities at runtime to different system requirements. By using the hardware virtualization technique in the ACES design, a fixed set of logic resources can be configured as different hardware modules at runtime to support multiple software applications. Further, by taki...
متن کاملA Hardware Design Model for Cryptographic Algorithms
A hardware implementation model is proposed that can be used in the design of stream ciphers, block ciphers and cryptographic hash functions. The cryptographic nite state machine (CFSM) model is no mathematical tool, but a set of criteria that have to be met by a real hardware nite state machine that will be used in the implementation of a cryptographic algorithm. Diiusion is studied by means o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Computers
سال: 2023
ISSN: ['1557-9956', '2326-3814', '0018-9340']
DOI: https://doi.org/10.1109/tc.2023.3278536