𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Reconfigurable Cryptographic Processor

✍ Scribed by Leibo Liu, Bo Wang, Shaojun Wei


Publisher
Springer
Year
2018
Tongue
English
Leaves
395
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also presents a case study of implementing the reconfigurable cryptographic processor β€œAnole” designed by the authors’ team. Moreover, it features discussions on countermeasures against physical attacks utilizing partially and dynamically reconfigurable array architecture to enhance security, as well as the latest trends for reconfigurable cryptographic processors. This book is intended for research scientists, graduate students, and engineers in electronic science and technology, cryptography, network and information security, as well as computer science and technology.

✦ Table of Contents


Foreword
Preface
Contents
1 Introduction
1.1 Information Security and Cryptographic Processor
1.2 Challenges of Cryptographic Processor Application Requirements
1.3 Traditional Cryptographic Processors
1.3.1 ASIC Cryptographic Processors
1.3.2 ISAP Cryptographic Processors
1.3.3 Limitation of Traditional Cryptographic Processors
1.4 Reconfigurable Cryptographic Processors
1.4.1 Overview of Reconfigurable Computing
1.4.2 Reconfigurable Cryptographic Processors
References
2 Analysis of the Reconfiguration Feature of Cryptographic Algorithms
2.1 Review and Classification of Cryptographic Algorithms
2.2 Symmetric Cryptographic Algorithm
2.2.1 Block Cipher Algorithm
2.2.2 Stream Ciphers
2.3 Hash Algorithms
2.3.1 Introduction to Hash Algorithms
2.3.2 Features of Hash Algorithms
2.3.3 Common Logic of Hash Algorithms
2.3.4 Parallelism of Hash Algorithms
2.4 Public-Key Ciphers
2.4.1 Introduction to Public-Key Ciphers
2.4.2 Features of Public-Key Ciphers
2.4.3 Common Logic of Public-Key Ciphers
2.4.4 Parallelism of Public-Key Ciphers
References
3 Hardware Architecture of Reconfigurable Cryptographic Processors
3.1 Reconfigurable Datapath
3.1.1 Reconfigurable Computing Unit
3.1.2 Interconnection Network
3.1.3 Data Storage
3.1.4 Heterogeneous Module
3.2 Reconfigurable Controller
3.2.1 Configuration Control Methods
3.2.2 Control State Machine
3.2.3 Configuration Information Organization and Storage
References
4 Compilation Method of Reconfigurable Cryptographic Processors
4.1 General Compilation Methods for Reconfigurable Computing Processors
4.2 Compilation Methods of a Reconfigurable Cryptographic Processors
4.2.1 Code Transformation and Optimization
4.2.2 IR Partition and Mapping
4.3 Compilation Examples of a Reconfigurable Cryptographic Processor
4.3.1 Implementation Examples of Symmetric Cryptographic Algorithm
4.3.2 Examples of Hash Algorithm Implementation
4.3.3 Examples of the Public-Key Cipher Algorithm Implementation
References
5 Examples of Reconfigurable Cryptographic Processor Design
5.1 Basic Architecture of the Processor Anole
5.1.1 Reconfigurable Computing Datapath
5.1.2 Design of the Reconfigurable Computing Controller
5.2 Key Technologies of Anole Processors
5.2.1 DCN
5.2.2 Concurrent Computation and Reconfiguration (CCR)
5.2.3 Configuration Compression and Organization (CCO)
5.3 Integrated Development Tools of Anole
5.3.1 Introduction to the Tools
5.3.2 Configuration Method
5.3.3 Demonstration Cases
5.4 Analysis of the Implementation Results of the Anole Processor
5.4.1 Implementation Results of the Chip
5.4.2 Chip Performance Comparison
References
6 Physical Attack Countermeasures for Reconfigurable Cryptographic Processors
6.1 Countermeasures Based on Time and Spatial Randomization
6.1.1 Fault Attack Countermeasure Based on Randomization Technologies
6.1.2 Randomization-Based Electromagnetic Attack Countermeasure Technology
6.2 Attack Countermeasure Technology of the Reconfigurable Processing Element Array
6.2.1 Processing Element-Based PUF Technology
6.2.2 Network-Based Attack Countermeasure Technology
References
7 Outlook of Reconfigurable Cryptographic Processing Application Technology
7.1 Fully Homomorphic Encryption and Reconfigurable Computing
7.1.1 Concept and Application of Fully Homomorphic Encryption
7.1.2 History and Status of Fully Homomorphic Encryption
7.1.3 Fully Homomorphic Encryption Based on Reconfigurable Computing
7.2 Hardware Trojans and Reconfigurable Computing
7.2.1 Classification and Examples of Hardware Trojans
7.2.2 Defense Technology of Hardware Trojan
7.2.3 Hardware Trojan Threat Countermeasures for Reconfigurable Computing
References
Afterword


πŸ“œ SIMILAR VOLUMES


Reconfigurable Cryptographic Processor
✍ Leibo Liu, Bo Wang, Shaojun Wei πŸ“‚ Library πŸ“… 2018 πŸ› Springer 🌐 English

<p>This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for reconfigurable cryptographic processors, and also

Cryptographic Algorithms on Reconfigurab
✍ Francisco Rodriguez-Henriquez, N.A. Saqib, Arturo DΓ­az PΓ©rez, Cetin Kaya Koc πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

<P>Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-time encryption are needed. Until now, there has been no book explaining how cryptographic algori

Cryptographic Algorithms on Reconfigurab
✍ Francisco RodrΓ­guez-HenrΓ­quez, Arturo DΓ­az PΓ©rez, Nazar Abbas Saqib, Γ‡etin Kaya πŸ“‚ Library πŸ“… 2007 πŸ› Springer US 🌐 English

<p><P>This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The concepts and techniques reviewed in this book will make special emphasis

Heterogeneous Reconfigurable Processors
✍ Chenxin Zhang, Liang Liu, Viktor Γ–wall (auth.) πŸ“‚ Library πŸ“… 2016 πŸ› Springer International Publishing 🌐 English

<p>This book focuses on domain-specific heterogeneous reconfigurable architectures, demonstrating for readers a computing platform which is flexible enough to support multiple standards, multiple modes, and multiple algorithms. The content is multi-disciplinary, covering areas of wireless communicat

Run-time Adaptation for Reconfigurable E
✍ Lars Bauer, JΓΆrg Henkel (auth.) πŸ“‚ Library πŸ“… 2011 πŸ› Springer-Verlag New York 🌐 English

<p>Run-time Adaptation for Reconfigurable Embedded Processors by: Lars Bauer JΓΆrg Henkel Embedded processors are the heart of embedded systems. Reconfigurable embedded processors comprise an extended instruction set that is implemented using a reconfigurable fabric (similar to a field-programmable g