Font Size: a A A

The Research Of Extending The Instructions For Dealing With The Symmetric-key Cryptography Based On RISC Microprocessor

Posted on:2007-09-26Degree:MasterType:Thesis
Country:ChinaCandidate:Y F LiuFull Text:PDF
GTID:2178360212475785Subject:Military communications science
Abstract/Summary:PDF Full Text Request
There are three possible approaches to enhancing the performance of encryption for embedded processors. One approach is to extend the Instruction Set Architecture (ISA) to support operations useful for cryptography. The second option is to build a dedicated cryptographic co-processor with its own instruction set and software. The third option is to exploit the increased parallelism and functionality of newer Intel Itanium IA-64 architecture to speed up critical portions of the industry standard RSA public key cipher is explored in.In order to enhance the performance of dealing with symmetric-key for embedded RISC processors, the thesis has adopted a method of extending the ISA to speed up crypto operations. This paper discusses the idea through researching the operation character of symmetric-key, RISC microprocessor architecture and the theory of hardware realization for the key operation units. The main contributions of this thesis are given below:The thesis has researched various cryptography processing systems, and then researches how to enhance the performance of dealing with symmetric-key based on RISC microprocessor through extending the ISA.The thesis has designed a RISC microprocessor based on MIPS ISA through researching the architecture of RISC microprocessor, and then verified the extending instructions based on the MIPS microprocessor.The thesis has summarized the key operation units of symmetric-key cipher through analyzing the operation character of symmetric-key cipher, and dealing with crypto algorithms based on RISC microprocessor.The thesis has researched the theory of hardware realization for the key operation units. For instance, shift operation unit, S-box substation unit, modular (2~n+1) add unit, modular (2~n+1) multiplication and bit permutation unit. This paper has realized extending ISA for dealing with symmetric-key cryptography.The experiment results indicate that on extending ISA microprocessor the performance of many symmetric-key algorithms is 1.7 ~10.8 times higher than on general purpose processor and 0.8~2.03 higher than on Parallel Vector Crypto Processing. These data prove that extending ISA can ensure high flexibility for all symmetric-key cipher algorithms and can achieve relatively high performance.
Keywords/Search Tags:Crypto Processing, RISC microprocessor, Shift Operation, S-box Substation, Modular (2~n+1) Add, Modular (2~n+1) Multiplication, Bit Permutation
PDF Full Text Request
Related items