首页> 外文期刊>ACM Computing Surveys >Architectures of Flexible Symmetric Key Crypto Engines-A Survey: From Hardware Coprocessor to Multi-Crypto-Processor System on Chip
【24h】

Architectures of Flexible Symmetric Key Crypto Engines-A Survey: From Hardware Coprocessor to Multi-Crypto-Processor System on Chip

机译:灵活的对称密钥加密引擎的体系结构-调查:从硬件协处理器到片上多加密处理器系统

获取原文
获取原文并翻译 | 示例
       

摘要

Throughput, flexibility, and security form the design trilogy of reconfigurable crypto engines; they must be carefully considered without reducing the major role of classical design constraints, such as surface, power consumption, dependability, and cost. Applications such as network security, Virtual Private Networks (VPN), Digital Rights Management (DRM), and pay per view have drawn attention to these three constraints. For more than ten years, many studies in the field of cryptographic engineering have focused on the design of optimized high-throughput hardware cryptographic cores (e.g., symmetric and asymmetric key block ciphers, stream ciphers, and hash functions). The flexibility of cryptographic systems plays a very important role in their practical application. Reconfigurable hardware systems can evolve with algorithms, face up to new types of attacks, and guarantee interoperability between countries and institutions. The flexibility of reconfigurable crypto processors and crypto coprocessors has reached new levels with the emergence of dynamically reconfigurable hardware architectures and tools. Last but not least, the security of systems that handle confidential information needs to be thoroughly evaluated at the design stage in order to meet security objectives that depend on the importance of the information to be protected and on the cost of protection. Usually, designers tackle security problems at the same time as other design constraints and in many cases target only one security objective, for example, a side-channel attack countermeasures, fault tolerance capability, or the monitoring of the device environment. Only a few authors have addressed all three design constraints at the same time. In particular, key management security (e.g., secure key generation and transmission, the use of a hierarchical key structure composed of session keys and master keys) has frequently been neglected to the benefit of performance and/or flexibility. Nevertheless, a few authors propose original processor architectures based on multi-crypto-processor structures and reconfigurable cryptographic arrays. In this article, we review published works on symmetric key crypto engines and present current trends and design challenges.
机译:吞吐量,灵活性和安全性构成了可重配置加密引擎的设计三部曲。必须仔细考虑它们,而不会降低经典设计约束的主要作用,例如表面,功耗,可靠性和成本。网络安全,虚拟专用网络(VPN),数字版权管理(DRM)和按次付费等应用吸引了对这三个约束的关注。十多年来,密码工程领域的许多研究都集中在优化的高通量硬件密码核心(例如对称和非对称密钥块密码,流密码和哈希函数)的设计上。密码系统的灵活性在其实际应用中起着非常重要的作用。可重配置的硬件系统可以随着算法而发展,可以应对新型攻击,并保证国家和机构之间的互操作性。随着动态可重新配置的硬件体系结构和工具的出现,可重新配置的加密处理器和加密协处理器的灵活性已达到了新的水平。最后但并非最不重要的一点是,需要在设计阶段对处理机密信息的系统的安全性进行彻底评估,以实现取决于要保护信息的重要性和保护成本的安全目标。通常,设计人员会与其他设计约束同时解决安全问题,并且在许多情况下,仅针对一个安全目标,例如,边信道攻击对策,容错能力或对设备环境的监视。只有少数作者同时解决了所有三个设计约束。特别地,为了性能和/或灵活性的好处,密钥管理安全性(例如,安全密钥的生成和传输,使用由会话密钥和主密钥组成的分层密钥结构的使用)经常被忽略。尽管如此,一些作者还是提出了基于多密码处理器结构和可重新配置密码阵列的原始处理器架构。在本文中,我们回顾了有关对称密钥加密引擎的已发表著作,并介绍了当前的趋势和设计挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号