JUCS - Journal of Universal Computer Science 11(1): 66-82, doi: 10.3217/jucs-011-01-0066
Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware
expand article infoNadia Nedjah, Luiza de Macedo Mourelle
‡ State University of Rio de Janeiro, Rio de Janeiro, Brazil
Open Access
Most cryptography systems are based on the modular exponentiation to perform the non-linear scrambling operation of data. It is performed using successive modular multiplications, which are time consuming for large operands. Accelerating cryptography needs optimising the time consumed by a single modular multiplication and/or reducing the total number of modular multiplications performed. Using a genetic algorithm, we first yield the minimal sequence of powers, generally called addition chain, that need to be computed to finally obtain the modular exponentiation result. Then, we exploit the co-design methodology to engineer a cryptographic device that accelerates the encryption/decryption throughput without requiring considerable hardware area. Moreover the obtained designed cryptographic hardware is completely secure against known attacks.
Evolutionary Computation, Co-Design, Genetic Algorithm, Cryptography, Addition-Chain