Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.4.593

Research on efficient HW/SW co-design method of light-weight cryptography using GEZEL  

Kim, Sung-Gon (Center for Information Security Technologies, Korea University)
Kim, Hyun-Min (Center for Information Security Technologies, Korea University)
Hong, Seok-Hie (Center for Information Security Technologies, Korea University)
Abstract
In this paper, we propose the efficient HW/SW co-design method of light-weight cryptography such as HIGHT, PRESENT and PRINTcipher using GEZEL. At first the symmetric cryptographic algorithms were designed using the GEZEL language which is efficiently used for HW/SW co-design. And for the improvement of performance the HW optimization theory such as unfolding, retiming and so forth were adapted to the cryptographic HW module conducted by FSMD. Also, the operation modes of those algorithms were implemented using C language in 8051 microprocessor, it can be compatible to various platforms. For providing reliable communication between HW/SW and preventing the time delay the improved handshake protocol was chosen for enhancing the performance of the connection between HW/SW. The improved protocol can process the communication-core and cryptography-core on the HW in parallel so that the messages can be transmitted to SW after HW operation and received from SW during encryption operation.
Keywords
HIGHT; PRESENT; PRINTcipher; GEZEL; HW/SW co-design; light-weight cryptography;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Patrick R. Schaumont, "A Practical Introduction to Hardware/Software Codesign," Springer, Dec. 2012.
2 Andrew B. Kahng, Jens Lienig, Igor L. Markov, Jin Hu, "VLSI Physical Design : From Graph Partitioning to Timing Closure," Springer, vol. 2, pp. 91-124, 2011.
3 L. Batina, D. Hwang, A. Hodjat, B.Preneel, and I. Verbauwhede, "Hardware/Software Co-design for Hyperelliptic Curve Cryptography (HECC) on the 8051 ${\mu}$P," Proc. CHES-LNCS, no. 3659, pp. 106-118, Springer-Verlag, 2005.
4 Y.K. Lee, H. Chan, and I. Verbauwhede, "Throughput Optimized SHA-1 Architecture Using Unfolding Transformation," ASAP 2006, pp. 354-359, 2006.
5 M. Knezevic, K. Sakiyama, Y.K. Lee, and I. Verbauwhede, "On the High-Throughput Implementation of RIPEMD-160 Hash Algorithm," Proc. ASAP 2008, pp. 6, 2008.
6 T. Kwon, H. Kim, and S. Hong, "SEED and ARIA algorithm design methods using GEZEL," Journal of The Korea Institute of Information Security & Cryptology, VOL.24, No.1, Feb. 2014.   과학기술학회마을   DOI
7 D. Hong, J. Sung, S. Hong, J. Lim, S.Lee, B.S. Koo, C. Lee, D. Chang, J. Lee, K. Jeong, H. Kim, J. Kim and S. Chee, "HIGHT : a new block cipher suitable for low-resource device," CHES 2006, LNCS 4249, pp. 46059. Springer-Verlag, 2006.
8 A. Bogdanov, L. Knudsen, G. Leander, C. Paar, "PRESENT: an ultra-lightweight block cipher," Workshop on Cryptographic Hardware and Embedded Systems, CHES'07, LNCS 4727, pp. 450-466, Springer-Verlag, 2007.
9 Lars Knudsen, Gregor Leander, Axel Poschmann, and Matthew J.B. Robshaw, "PRINT CIPHER : A Block Ciipher for IC-Printing," Workshop on Cryptographic Hardware and Embedded Systems, CHES'10, pp.16-32, Springer-Verlag, 2010.