Font Size: a A A

Research On Computing Memory For Cryptographic Algorithm

Posted on:2016-09-10Degree:MasterType:Thesis
Country:ChinaCandidate:K ZhaoFull Text:PDF
GTID:2298330467979354Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
As information security is important to the national economy and the people’s livelihood, research on the cryptographic algorithm and its software or hardware realization has important theoretical value and practical significance. In this thesis we focus on the RSA and SHA-256which are widly used in the public-key cryptography and hash functions. On the principle of cryptographic algorithm, we propose the computing memory architecture to accelerate the algorithm. The main content and innovations of this thesis include:Based on the principle of RSA and SHA-256, we analyze the execution trace of the software realization, hot function segment and storage behavior. Propose one computing memory architecture for cryptographic algorithm. The main idea is combining the data and the corresponding arithmetic logic and put them into the memory. Design calculation particle and add new cryptographic memory to complete the encryption and decryption operations.For RSA, design two calculation particles to calculate partial multiplication in the modular multiplication and divide the modular multiplication into precomputation and multiply-accumulate based on the calculation particle. The modular multiplication and modular exponentiation are controlled by state machines and the maintenance logic of cryptographic memory is embedded in the memory. The result shows that it needs1097clock cycles to complete the1024-bit modular multiplication and2312Bytes new added cryptographic memory in the computing memory module.For SHA-256, unroll the hash iteration by two times and design four calculation particles to calculate the message sequence. Take the output of calculation particle as the input of hash iteration per round. Coordinate with the pre-compution of related parameters on the critical path and the balance of additions, we complete the design of hash iteration’s datapath. The result shows thatit needs33clock cycles to complete the hash iteration in SHA-256and1408 Bytes new added cryptography memory in the computing memory module.
Keywords/Search Tags:RSA, SHA-256, Montogmery Modular Multiplication, Computing Memory, Cryptographic Memory, Calculation Particle, Loop Unroll
PDF Full Text Request
Related items