SlideShare a Scribd company logo
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 157 – 161
_______________________________________________________________________________________________
157
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
High Speed Unified Field Crypto processor for Security Applications using
Verilog
N. Kumaresan
Department of ECE, Anna University,
Regional Campus Coimbatore, Tamil Nadu, India
kumaresanauc@gmail.com
S. Kodeeswaran
Department of ECE, Anna University,
Regional Campus Coimbatore, Tamil Nadu, India
skodeeswaranme@gmail.com
Abstract—Traditional cryptographic algorithms are developed on a software platform and provides information security schemes. Also, some
processors have performed one of the crypto algorithms (either prime field or binary extension field) on chip level with optimal performance.
The objective is to design and implement both symmetric key and public key algorithms of a cryptographic on chip level and make better
architecture with pleasing performance. Crypto-processor design, have been designed with unified field instructions to make different processor
architecture and improve system performance. The proposed high speed Montgomery modular multiplication and high radix Montgomery
multiplication algorithms for pairing computation supports the public key algorithm. This design has been developed using Verilog HDL‟s and
verified using ModelSim-Altera 6.4a, and it has synthesized with Xilinx 9.1 Integrated Synthesis Environment (ISE) tool.
Keywords-Cryptographic algorithm, Crypto processor, Modular arithmetic
__________________________________________________*****_________________________________________________
I. INTRODUCTION
Cryptography is a one of the technique to provide high
authentication to the users. This secured communication is
achieved by various algorithms. These algorithms possess
various steps and provide security to the specific system.
Communication domain has widely developed and enhanced
throughout the world.
Everyone who does shopping, transferring money through
their smart cards and smart phone or drawing money from the
ATM (Automated Teller Machine) using their ATM card need
some security code word to access it. That security code must
be confidential or else hackers can use it illegally to withdraw
money from other‟s account. Traditionally, these processors are
unique, like the microprocessor and microcontrollers. These
controllers only permit the authorized user to communicate
with the system. These traditional processors cannot provide
secure communication. In this traditional technology, secure
communication is done by software platform and not by the
hardware. It has led to hacking of personal data like, PIN
number, mail account password etc. To make the system faster
and reduce the hacking problem, we need a system to do the
security process on the hardware platform, so we often call this
scenario as Crypto-processor.
A Crypto-processor is a System on Chip (SoC) based
microprocessor which carries out the encryption and decryption
operations. A secured Crypto-processor has dedicated
instructions in the environment. Secure key exchange with
public key or secure key algorithm needs various hardware
resources. The main objective of this work is to propose a
security algorithm which is handled by the dedicated chip
itself. So, it becomes handy. Pairing computation does parallel
operation and makes the systems performance speedy.
II. PROPOSED SYSTEM
The Crypto-processor designing here has both fields of
instruction. Also, it contains general purpose instruction which
can lead to getting information from the user and making
secure communication that can be handled by crypto
instruction or otherwise secure instruction. If it is necessary to
design a symmetric key algorithm, it has to use prime field
instruction whereas for public key algorithm, it has to use
binary extension field instruction. So, the proposed processor
can meet this requirement and provide an instruction for both
fields of operation. This kind of design is called as unified field
operation.
The digital system proposed in this paper uses High radix
Montgomery multiplication and it will act as Prime Field
GF(P) instruction, it could well act as a symmetric key
instruction. Another method has been imported in this digital
architecture is Binary Extension Field GF (2M
) architecture and
it has designed with Galois Field Multiplication Instruction.
Figure 1. Block diagram of the proposed Crypto processor.
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 157 – 161
_______________________________________________________________________________________________
158
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
The Crypto-processor is properly connected with a clock
and reset. The clock defines the operating speed of the
processor and reset signal can make the system start from
initial incident at any time. For this processor, there is a set of
Opcode, it shows which function processor shall have to do.
When initializing Opcode to any of the given instruction, it
fetches the source address and destination address for this
particular operation that can be handled by the instruction
decoder. This information is passed to data memory and ALU.
Data memory can provide operand information to ALU unit as
per source address and ALU can perform the corresponding
operation and it will be stored in temporary memory as well as
data memory. Once the sequence of operations is over then
output can be presented in the memory to the user.
ALU consists of general purpose instruction and secure
instruction in which general purpose instructions that are usual
operations followed in typical processor. Also in secure
instruction operation consists of dual field or unified field
operation which can do both prime field and binary extension
field of operation. Instruction sets designed and it is tabulated
as in Table. 1. It consists of prime instruction for modular
addition, subtraction and high radix modular multiplication,
and binary extension field instruction for Galois field
multiplication; also it has a general purpose instruction like
arithmetic and logic instruction, shift and rotate.
TABLE I. INSTRUCTION SET
This design constraint is designing Crypto-processor with
unified field instruction. It follows the design flow; finally it
could end with two things that are Register Transfer Level
(RTL) schematic and physical layout. This work scopes RTL
schematic design. For this design, a Verilog code has used for
mathematical approach of the algorithm and straight forward
design like memory and decoder designs are developed using
Hardware Description Language (HDL). Once the design is
written in HDL, it is possible to verify using simulation tools.
The processor has been developed using Verilog HDL. Also, it
produces device utilization summary and timing summary.
Finally the design could implement it on any FPGA‟s.
Proposed design has explained with a following flow
diagram. Each algorithm has had a sequence of steps and
Figure 2 shows a flow diagram of High radix Montgomery
Multiplication algorithm.
Step 1: Need to choose A, B, C, D and P1, P2 – these
values must be large prime numbers. N represents the number
of input bit width.
Step 2: Number of iterations to compute the intermediate
result depends on width of input.
Step 3: Intermediate results need a modulo operation and
simple arithmetic operation like addition and multiplication.
Step 4: Final result is the addition of intermediate remainder
and simple expression carried out by using addition and
multiplication.
Figure 2. Flow diagram of high radis Montgomery
multiplication.
Following flow diagram describes the operation of modular
addition.
Step1: Choose highest prime number of A, B and P.
Step2: Then separately calculate remainder value
corresponding input A and B.
Step3: Finally, add those values to obtain modular addition.
Sl.
No.
Instruction Operation
1.
Addition A + B mod P – Prime
field
2.
Subtraction A – B mod P – Prime
field
3.
Multiplication A*B mod p – Prime
field
4.
High Radix
Montgomery
Multiplication
(AB+CD) R-1
– Prime
field
5.
Galois field
Multiplication
A * B – Binary
extension field
GF(2m
)
6.
Arithmetic and
logical, shift &
rotate, LOAD,
STORE – General
Instruction Set
This includes +, -, *,
/, &, |, ^, >>, <<
START
INPUT: A, B, C, D, P1, P2, R
OUTPUT: (AB + CD) R-1
STOP
Count <= 6
Q[count] = S[count] mod 2R
S[count] = (S[count] >> R) + (Q[count] * P2) +
(A[count] * B) +(C[count] * D)
S[8] = S[7] + (Q[6] * P1)
Out = S[8]
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 157 – 161
_______________________________________________________________________________________________
159
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
Figure 3. Modular addition.
Following flow diagram describes the operation of modular
subtraction.
Step1: Choose highest prime number of A, B and P.
Step2: Then separately calculate remainder value
corresponding input A and B.
Step3: Finally, subtract those values to obtain modular
Subtraction.
Figure 4. Modular subtraction.
The binary extension field instruction has been explained
with flow diagram shown in figure 5. And its steps are as
follows:
Step 1: Choose A, B and P prime values.
Step 2: Using Look Up table based design; its
corresponding output will be obtained.
Figure 5. Galois multiplication GF (2M
).
III. RESULTS ANS DISCUSSION
The simulation result can describe how the designs can
response for a different input stream at various time incidents.
With the application of an input to the system, it is possible by
writing test bench for a designed system. In a simulated
window there are details which clearly show that at how next
modules responds as per the input given for each module.
Figure 6. Simulation result of the proposed Crypto
processor.
Above screenshot shows the result of crypto-processor, in
which clock and reset are operating signal of the processor. The
clocks can able to provide 20ns with 50% duty cycle. A reset
signal is used to start a processor from the initial value. An
Opcode has been used to define which operation currently the
processor is executing. The data_out signal represents the
output of the processor. The operands for processors are
fetched from data memory.
Examine the simulation result with an example, for Opcode
input is 0, it could perform addition of two numbers, namely
data1 is in decimal „1‟ and data2 is decimal „1000‟, it will be
added and the result is 1001. For Opcode input is 18, it could
perform prime field high radix Montgomery multiplication.
This multiplication needs two prime numbers, namely P1 and
P2 also it needs four data inputs and its result is 721344.
For an Opcode input is 19, it could perform binary
extension field multiplication. It needs two operands and its
START
INPUT: A, B, P
OUTPUT: A+ B mod P
C1 = A mod P C2 = B mod P
STOP
C = C1 + C2
START
INPUT: A, B, P
OUTPUT: A- B mod P
C1 = A mod P C2 = B mod P
STOP
C = C1 - C2
START
INPUT: A, B
OUTPUT: C
C = LUT[A][B]
STOP
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 157 – 161
_______________________________________________________________________________________________
160
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
output taken from Lookup table. Its output is 8, for an input 1
and 8. Once designs are verified using simulation tools, it is
time to synthesis a design. Synthesis means that HDL code can
be converted into the RTL schematic, so that design can easily
implement on any FPGA. The following screen shot has taken
for this particular device Virtex5-XC5VLX30-FF324-3.
Figure 7. RTL view of Crypto processor.
This result shows the top module of our Crypto-processor,
this shows all input and output of the Crypto-processor. Once
our HDL code can be converted to RTL as shown in above
Figure 7, this can be implemented on any FPGA. This shows
the internal design of our Crypto-processor. This internal
schematic shows how data are connected between modules.
The Crypto-processor consists of data memory, instruction
memory, instruction decoder, ALU, program counter and
temporary memory. These details are shown in the following
Figure 8.
After completing synthesis, we get design summary, timing
summary and details of combinational and sequential logic
utilized by design. An area result obtained by the crypto-
processor as taken Virtex5 as a target device. As per calculation
56% of the area has occupied by a Crypto-processor.
Figure 8. Internal modules of Crypto processor.
Figure 9. Device utilization summary of a Crypto
processor.
Figure 10. Timing summary of a Crypto processor.
This HDL synthesis report details gives us knowledge about
how much combinational and sequential logic that has been
used by the Crypto-processor. Combinational logic includes
adder/subtractors, multiplier, multiplexer and logic gate.
Similarly sequential logic includes counters, registers and
latches.
Figure 11. Macro static details of a Crypto processor.
IV. CONCLUSION
A Crypto-processor prototype design has been made and
synthesized. It can be able to execute unified field instruction.
To achieve creditable performance and having both instruction
set in single processor architecture, had invoked both prime and
binary field algorithms into single processor. Also, this design
used high radix Montgomery multiplication to make pairing
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 10 157 – 161
_______________________________________________________________________________________________
161
IJRITCC | October 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
computation to attain system as fast as possible.
Consequentially, this design is very useful for simulation and
synthesis tools for analyzing this architecture and it has been
occupied 56% area and timing it is also achieved credibly
equally to known architecture.
In future, it could add few more instructions like Modular
exponential and Modular inversion. Also to increase the
number of pipeline stages to make better performance.
For papers published in translation journals, please give the
English citation first, followed by the original foreign-language
citation [6].
V. REFERENCES
[1] V. Bunimov and M. Schimmler, “Area and time efficient
modular multiplication of large integers”, in Proc. IEEE Int.
Conf. Application-specific systems, architectures, and
processors, ASAP 2003, The Hague, Netherlands, 2003, pp.
400-409.
[2] R. C. C. Cheung, Sylvain Duquesne, Junfeng Fan, Nicolas
Guillermin, Ingrid Verbauwhede, and Gavin Xiaoxu Yao,
“FPGA implementation of pairings using residue number system
and lazy reduction”, in Proc. 13th
Int. Conf. on Cryptographic
hardware and embedded systems, Nara, Japan, 2011, pp. 421–
441.
[3] J. Fan, F. Vercauteren, and I. Verbauwhede, “Efficient hardware
implementation of Fp-Arithmetic for pairing-friendly curves”,
IEEE Transactions on Computers., vol. 61, no. 5, pp. 676-685,
2012.
[4] S. Ghosh, D. Mukhopadhyay, and D. Roy Chowdhury, “High
speed flexible pairing cryptoprocessor on FPGA platform”, in
Proc. 4th
Int. Conf. on Pairing-based cryptography, Pairing 2010,
Japan, 2010, pp. 450–466.
[5] H. Wu, “Bit-parallel finite field multiplier and squarer using
polynomial basis”, IEEE Transactions on Computers, vol. 51,
no. 7, pp. 750-758, 2002.
[6] J. Han, Y. Li, Z. Yu, and X. Zeng, “A 65nm cryptographic
processor for high speed pairing computation”, IEEE
Transactions on VLSI systems, vol. 23, no. 4, pp. 692-701,
2014.
[7] D. Kammler, D. Zhang, P. Schwabe, H. Scharwaechter, M.
Langenberg, D. Auras, G. Ascheid, and R. Mathar, “Designing
an ASIP for cryptographic pairing over Barreto-Naehrig curves”,
in Proc. 11th
Int. workshop on Cryptographic hardware and
embedded systems, Switzerland, 2009, pp. 254-271.
[8] Y. Li, J. Han, S. Wang, and D. Fang, “An 800Mhz
cryptographic pairing processor in 65nm CMOS”, in Proc. IEEE
Asian Conf. on Solid State Circuits, Kobe, 2012, pp. 217-220.
[9] O. Nibouche, A. Bouridane, and M. Nibouche, “Architectures
for Montgomery‟s multiplication”, in Proc. IEE Computers and
digital techniques, vol. 150, no. 6, 2003, pp. 361-368.
[10] J. Fan, F. Vercauteren, and I. Verbauwhede, “Faster Fp –
arithmetic for cryptographic pairing on Barreto-Naehrig curves”,
in Proc. 11th
Int. workshop on Cryptographic hardware and
embedded systems, Switzerland, 2009, pp. 240-253.

More Related Content

What's hot

Lecture 7
Lecture 7Lecture 7
Lecture 7
RahulRathi94
 
Register transfer and micro operation
Register transfer and micro operationRegister transfer and micro operation
Register transfer and micro operation
Kamal Acharya
 
Design and simulation of a non pipelined multi cycle 16 bit risc educational ...
Design and simulation of a non pipelined multi cycle 16 bit risc educational ...Design and simulation of a non pipelined multi cycle 16 bit risc educational ...
Design and simulation of a non pipelined multi cycle 16 bit risc educational ...
IAEME Publication
 
Cs6303 unit2
Cs6303 unit2 Cs6303 unit2
Chapter 4
Chapter 4Chapter 4
Chapter 4
Soumyajit Dutta
 
Computer organiztion3
Computer organiztion3Computer organiztion3
Computer organiztion3
Umang Gupta
 
Design and implementation of complex floating point processor using fpga
Design and implementation of complex floating point processor using fpgaDesign and implementation of complex floating point processor using fpga
Design and implementation of complex floating point processor using fpga
VLSICS Design
 
RTL
RTLRTL
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoder
eSAT Publishing House
 
Micro operations
Micro operationsMicro operations
Micro operations
Ramakrishna Reddy Bijjam
 
Combinational Circuits
Combinational CircuitsCombinational Circuits
Combinational Circuits
Dilum Bandara
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
RahulRathi94
 
REGISTER TRANSFER AND MICRO OPERATIONS
REGISTER TRANSFER AND MICRO OPERATIONSREGISTER TRANSFER AND MICRO OPERATIONS
REGISTER TRANSFER AND MICRO OPERATIONS
Anonymous Red
 
THE PROCESSOR
THE PROCESSORTHE PROCESSOR
THE PROCESSOR
Jai Sudhan
 
RTL
 RTL RTL
Combinational logic With Multiplexers and Decoders
Combinational logic With Multiplexers and DecodersCombinational logic With Multiplexers and Decoders
Combinational logic With Multiplexers and Decoders
Harsh Parmar
 
Registers in coa
Registers in coaRegisters in coa
Registers in coa
Ramakrishna Reddy Bijjam
 
IRJET- To Design 16 bit Synchronous Microprocessor using VHDL on FPGA
IRJET-  	  To Design 16 bit Synchronous Microprocessor using VHDL on FPGAIRJET-  	  To Design 16 bit Synchronous Microprocessor using VHDL on FPGA
IRJET- To Design 16 bit Synchronous Microprocessor using VHDL on FPGA
IRJET Journal
 

What's hot (18)

Lecture 7
Lecture 7Lecture 7
Lecture 7
 
Register transfer and micro operation
Register transfer and micro operationRegister transfer and micro operation
Register transfer and micro operation
 
Design and simulation of a non pipelined multi cycle 16 bit risc educational ...
Design and simulation of a non pipelined multi cycle 16 bit risc educational ...Design and simulation of a non pipelined multi cycle 16 bit risc educational ...
Design and simulation of a non pipelined multi cycle 16 bit risc educational ...
 
Cs6303 unit2
Cs6303 unit2 Cs6303 unit2
Cs6303 unit2
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Computer organiztion3
Computer organiztion3Computer organiztion3
Computer organiztion3
 
Design and implementation of complex floating point processor using fpga
Design and implementation of complex floating point processor using fpgaDesign and implementation of complex floating point processor using fpga
Design and implementation of complex floating point processor using fpga
 
RTL
RTLRTL
RTL
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoder
 
Micro operations
Micro operationsMicro operations
Micro operations
 
Combinational Circuits
Combinational CircuitsCombinational Circuits
Combinational Circuits
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
REGISTER TRANSFER AND MICRO OPERATIONS
REGISTER TRANSFER AND MICRO OPERATIONSREGISTER TRANSFER AND MICRO OPERATIONS
REGISTER TRANSFER AND MICRO OPERATIONS
 
THE PROCESSOR
THE PROCESSORTHE PROCESSOR
THE PROCESSOR
 
RTL
 RTL RTL
RTL
 
Combinational logic With Multiplexers and Decoders
Combinational logic With Multiplexers and DecodersCombinational logic With Multiplexers and Decoders
Combinational logic With Multiplexers and Decoders
 
Registers in coa
Registers in coaRegisters in coa
Registers in coa
 
IRJET- To Design 16 bit Synchronous Microprocessor using VHDL on FPGA
IRJET-  	  To Design 16 bit Synchronous Microprocessor using VHDL on FPGAIRJET-  	  To Design 16 bit Synchronous Microprocessor using VHDL on FPGA
IRJET- To Design 16 bit Synchronous Microprocessor using VHDL on FPGA
 

Similar to High Speed Unified Field Crypto processor for Security Applications using Verilog

Remote Video Monitoring System Using Raspberry Pi 3 and GPRS Module
Remote Video Monitoring System Using Raspberry Pi 3 and GPRS ModuleRemote Video Monitoring System Using Raspberry Pi 3 and GPRS Module
Remote Video Monitoring System Using Raspberry Pi 3 and GPRS Module
rahulmonikasharma
 
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo Codes
IRJET Journal
 
Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...
Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...
Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...
rahulmonikasharma
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...
IRJET Journal
 
IRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo Adder
IRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo AdderIRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo Adder
IRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo Adder
IRJET Journal
 
Implementation of MAC using Modified Booth Algorithm
Implementation of MAC using Modified Booth AlgorithmImplementation of MAC using Modified Booth Algorithm
Implementation of MAC using Modified Booth Algorithm
Association of Scientists, Developers and Faculties
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
rahulmonikasharma
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
rahulmonikasharma
 
The Principle Of Ultrasound Imaging System
The Principle Of Ultrasound Imaging SystemThe Principle Of Ultrasound Imaging System
The Principle Of Ultrasound Imaging System
Melissa Luster
 
System Development for Verification of General Purpose Input Output
System Development for Verification of General Purpose Input OutputSystem Development for Verification of General Purpose Input Output
System Development for Verification of General Purpose Input Output
RSIS International
 
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
IRJET Journal
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
eSAT Publishing House
 
PID Controller based DC Motor Speed Control
PID Controller based DC Motor Speed ControlPID Controller based DC Motor Speed Control
PID Controller based DC Motor Speed Control
rahulmonikasharma
 
Basic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filterBasic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filter
eSAT Journals
 
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
IRJET Journal
 
High Speed and Area Efficient Matrix Multiplication using Radix-4 Booth Multi...
High Speed and Area Efficient Matrix Multiplication using Radix-4 Booth Multi...High Speed and Area Efficient Matrix Multiplication using Radix-4 Booth Multi...
High Speed and Area Efficient Matrix Multiplication using Radix-4 Booth Multi...
IRJET Journal
 
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
IRJET Journal
 
Intelligent traffic light controller using embedded system
Intelligent traffic light controller using embedded systemIntelligent traffic light controller using embedded system
Intelligent traffic light controller using embedded system
IRJET Journal
 
Auto conversion of serial C code to CUDA code
Auto conversion of serial C code to CUDA codeAuto conversion of serial C code to CUDA code
Auto conversion of serial C code to CUDA code
IRJET Journal
 
3-Axis Motion Control of CNC Machine based on G-Code, M-Code using FPGA and a...
3-Axis Motion Control of CNC Machine based on G-Code, M-Code using FPGA and a...3-Axis Motion Control of CNC Machine based on G-Code, M-Code using FPGA and a...
3-Axis Motion Control of CNC Machine based on G-Code, M-Code using FPGA and a...
ijsrd.com
 

Similar to High Speed Unified Field Crypto processor for Security Applications using Verilog (20)

Remote Video Monitoring System Using Raspberry Pi 3 and GPRS Module
Remote Video Monitoring System Using Raspberry Pi 3 and GPRS ModuleRemote Video Monitoring System Using Raspberry Pi 3 and GPRS Module
Remote Video Monitoring System Using Raspberry Pi 3 and GPRS Module
 
IRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo CodesIRJET-Error Detection and Correction using Turbo Codes
IRJET-Error Detection and Correction using Turbo Codes
 
Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...
Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...
Analysis of GF (2m) Multiplication Algorithm: Classic Method v/s Karatsuba-Of...
 
Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...Development of Software for Estimation of Structural Dynamic Characteristics ...
Development of Software for Estimation of Structural Dynamic Characteristics ...
 
IRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo Adder
IRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo AdderIRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo Adder
IRJET- Implementation of FIR Filter using Self Tested 2n-2k-1 Modulo Adder
 
Implementation of MAC using Modified Booth Algorithm
Implementation of MAC using Modified Booth AlgorithmImplementation of MAC using Modified Booth Algorithm
Implementation of MAC using Modified Booth Algorithm
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
 
Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...Authentic Patient Data and Optimization Process through Cryptographic Image o...
Authentic Patient Data and Optimization Process through Cryptographic Image o...
 
The Principle Of Ultrasound Imaging System
The Principle Of Ultrasound Imaging SystemThe Principle Of Ultrasound Imaging System
The Principle Of Ultrasound Imaging System
 
System Development for Verification of General Purpose Input Output
System Development for Verification of General Purpose Input OutputSystem Development for Verification of General Purpose Input Output
System Development for Verification of General Purpose Input Output
 
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
IRJET- A Study of Programmable Logic Controllers (PLC) and Graphical User Int...
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
PID Controller based DC Motor Speed Control
PID Controller based DC Motor Speed ControlPID Controller based DC Motor Speed Control
PID Controller based DC Motor Speed Control
 
Basic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filterBasic signal processing system design on fpga using lms based adaptive filter
Basic signal processing system design on fpga using lms based adaptive filter
 
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
IRJET-A Study of Programmable Logic Controllers (PLC) and Graphical User Inte...
 
High Speed and Area Efficient Matrix Multiplication using Radix-4 Booth Multi...
High Speed and Area Efficient Matrix Multiplication using Radix-4 Booth Multi...High Speed and Area Efficient Matrix Multiplication using Radix-4 Booth Multi...
High Speed and Area Efficient Matrix Multiplication using Radix-4 Booth Multi...
 
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
Design of a Novel Multiplier and Accumulator using Modified Booth Algorithm w...
 
Intelligent traffic light controller using embedded system
Intelligent traffic light controller using embedded systemIntelligent traffic light controller using embedded system
Intelligent traffic light controller using embedded system
 
Auto conversion of serial C code to CUDA code
Auto conversion of serial C code to CUDA codeAuto conversion of serial C code to CUDA code
Auto conversion of serial C code to CUDA code
 
3-Axis Motion Control of CNC Machine based on G-Code, M-Code using FPGA and a...
3-Axis Motion Control of CNC Machine based on G-Code, M-Code using FPGA and a...3-Axis Motion Control of CNC Machine based on G-Code, M-Code using FPGA and a...
3-Axis Motion Control of CNC Machine based on G-Code, M-Code using FPGA and a...
 

More from rahulmonikasharma

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
rahulmonikasharma
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
rahulmonikasharma
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
rahulmonikasharma
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
rahulmonikasharma
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
rahulmonikasharma
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
rahulmonikasharma
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
rahulmonikasharma
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
rahulmonikasharma
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
rahulmonikasharma
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
rahulmonikasharma
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
rahulmonikasharma
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
rahulmonikasharma
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
rahulmonikasharma
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
rahulmonikasharma
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
rahulmonikasharma
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
rahulmonikasharma
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
rahulmonikasharma
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
rahulmonikasharma
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
rahulmonikasharma
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
rahulmonikasharma
 

More from rahulmonikasharma (20)

Data Mining Concepts - A survey paper
Data Mining Concepts - A survey paperData Mining Concepts - A survey paper
Data Mining Concepts - A survey paper
 
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
A Review on Real Time Integrated CCTV System Using Face Detection for Vehicle...
 
Considering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP FrameworkConsidering Two Sides of One Review Using Stanford NLP Framework
Considering Two Sides of One Review Using Stanford NLP Framework
 
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication SystemsA New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
A New Detection and Decoding Technique for (2×N_r ) MIMO Communication Systems
 
Broadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A SurveyBroadcasting Scenario under Different Protocols in MANET: A Survey
Broadcasting Scenario under Different Protocols in MANET: A Survey
 
Sybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANETSybil Attack Analysis and Detection Techniques in MANET
Sybil Attack Analysis and Detection Techniques in MANET
 
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine FormulaA Landmark Based Shortest Path Detection by Using A* and Haversine Formula
A Landmark Based Shortest Path Detection by Using A* and Haversine Formula
 
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
Processing Over Encrypted Query Data In Internet of Things (IoTs) : CryptDBs,...
 
Quality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry PiQuality Determination and Grading of Tomatoes using Raspberry Pi
Quality Determination and Grading of Tomatoes using Raspberry Pi
 
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
Comparative of Delay Tolerant Network Routings and Scheduling using Max-Weigh...
 
DC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide NanoparticlesDC Conductivity Study of Cadmium Sulfide Nanoparticles
DC Conductivity Study of Cadmium Sulfide Nanoparticles
 
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDMA Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
A Survey on Peak to Average Power Ratio Reduction Methods for LTE-OFDM
 
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy MonitoringIOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
IOT Based Home Appliance Control System, Location Tracking and Energy Monitoring
 
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
Thermal Radiation and Viscous Dissipation Effects on an Oscillatory Heat and ...
 
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
Advance Approach towards Key Feature Extraction Using Designed Filters on Dif...
 
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM SystemAlamouti-STBC based Channel Estimation Technique over MIMO OFDM System
Alamouti-STBC based Channel Estimation Technique over MIMO OFDM System
 
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault DiagnosisEmpirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
Empirical Mode Decomposition Based Signal Analysis of Gear Fault Diagnosis
 
Short Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA TechniqueShort Term Load Forecasting Using ARIMA Technique
Short Term Load Forecasting Using ARIMA Technique
 
Impact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line CouplerImpact of Coupling Coefficient on Coupled Line Coupler
Impact of Coupling Coefficient on Coupled Line Coupler
 
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction MotorDesign Evaluation and Temperature Rise Test of Flameproof Induction Motor
Design Evaluation and Temperature Rise Test of Flameproof Induction Motor
 

Recently uploaded

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 

Recently uploaded (20)

Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 

High Speed Unified Field Crypto processor for Security Applications using Verilog

  • 1. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 157 – 161 _______________________________________________________________________________________________ 157 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ High Speed Unified Field Crypto processor for Security Applications using Verilog N. Kumaresan Department of ECE, Anna University, Regional Campus Coimbatore, Tamil Nadu, India kumaresanauc@gmail.com S. Kodeeswaran Department of ECE, Anna University, Regional Campus Coimbatore, Tamil Nadu, India skodeeswaranme@gmail.com Abstract—Traditional cryptographic algorithms are developed on a software platform and provides information security schemes. Also, some processors have performed one of the crypto algorithms (either prime field or binary extension field) on chip level with optimal performance. The objective is to design and implement both symmetric key and public key algorithms of a cryptographic on chip level and make better architecture with pleasing performance. Crypto-processor design, have been designed with unified field instructions to make different processor architecture and improve system performance. The proposed high speed Montgomery modular multiplication and high radix Montgomery multiplication algorithms for pairing computation supports the public key algorithm. This design has been developed using Verilog HDL‟s and verified using ModelSim-Altera 6.4a, and it has synthesized with Xilinx 9.1 Integrated Synthesis Environment (ISE) tool. Keywords-Cryptographic algorithm, Crypto processor, Modular arithmetic __________________________________________________*****_________________________________________________ I. INTRODUCTION Cryptography is a one of the technique to provide high authentication to the users. This secured communication is achieved by various algorithms. These algorithms possess various steps and provide security to the specific system. Communication domain has widely developed and enhanced throughout the world. Everyone who does shopping, transferring money through their smart cards and smart phone or drawing money from the ATM (Automated Teller Machine) using their ATM card need some security code word to access it. That security code must be confidential or else hackers can use it illegally to withdraw money from other‟s account. Traditionally, these processors are unique, like the microprocessor and microcontrollers. These controllers only permit the authorized user to communicate with the system. These traditional processors cannot provide secure communication. In this traditional technology, secure communication is done by software platform and not by the hardware. It has led to hacking of personal data like, PIN number, mail account password etc. To make the system faster and reduce the hacking problem, we need a system to do the security process on the hardware platform, so we often call this scenario as Crypto-processor. A Crypto-processor is a System on Chip (SoC) based microprocessor which carries out the encryption and decryption operations. A secured Crypto-processor has dedicated instructions in the environment. Secure key exchange with public key or secure key algorithm needs various hardware resources. The main objective of this work is to propose a security algorithm which is handled by the dedicated chip itself. So, it becomes handy. Pairing computation does parallel operation and makes the systems performance speedy. II. PROPOSED SYSTEM The Crypto-processor designing here has both fields of instruction. Also, it contains general purpose instruction which can lead to getting information from the user and making secure communication that can be handled by crypto instruction or otherwise secure instruction. If it is necessary to design a symmetric key algorithm, it has to use prime field instruction whereas for public key algorithm, it has to use binary extension field instruction. So, the proposed processor can meet this requirement and provide an instruction for both fields of operation. This kind of design is called as unified field operation. The digital system proposed in this paper uses High radix Montgomery multiplication and it will act as Prime Field GF(P) instruction, it could well act as a symmetric key instruction. Another method has been imported in this digital architecture is Binary Extension Field GF (2M ) architecture and it has designed with Galois Field Multiplication Instruction. Figure 1. Block diagram of the proposed Crypto processor.
  • 2. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 157 – 161 _______________________________________________________________________________________________ 158 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ The Crypto-processor is properly connected with a clock and reset. The clock defines the operating speed of the processor and reset signal can make the system start from initial incident at any time. For this processor, there is a set of Opcode, it shows which function processor shall have to do. When initializing Opcode to any of the given instruction, it fetches the source address and destination address for this particular operation that can be handled by the instruction decoder. This information is passed to data memory and ALU. Data memory can provide operand information to ALU unit as per source address and ALU can perform the corresponding operation and it will be stored in temporary memory as well as data memory. Once the sequence of operations is over then output can be presented in the memory to the user. ALU consists of general purpose instruction and secure instruction in which general purpose instructions that are usual operations followed in typical processor. Also in secure instruction operation consists of dual field or unified field operation which can do both prime field and binary extension field of operation. Instruction sets designed and it is tabulated as in Table. 1. It consists of prime instruction for modular addition, subtraction and high radix modular multiplication, and binary extension field instruction for Galois field multiplication; also it has a general purpose instruction like arithmetic and logic instruction, shift and rotate. TABLE I. INSTRUCTION SET This design constraint is designing Crypto-processor with unified field instruction. It follows the design flow; finally it could end with two things that are Register Transfer Level (RTL) schematic and physical layout. This work scopes RTL schematic design. For this design, a Verilog code has used for mathematical approach of the algorithm and straight forward design like memory and decoder designs are developed using Hardware Description Language (HDL). Once the design is written in HDL, it is possible to verify using simulation tools. The processor has been developed using Verilog HDL. Also, it produces device utilization summary and timing summary. Finally the design could implement it on any FPGA‟s. Proposed design has explained with a following flow diagram. Each algorithm has had a sequence of steps and Figure 2 shows a flow diagram of High radix Montgomery Multiplication algorithm. Step 1: Need to choose A, B, C, D and P1, P2 – these values must be large prime numbers. N represents the number of input bit width. Step 2: Number of iterations to compute the intermediate result depends on width of input. Step 3: Intermediate results need a modulo operation and simple arithmetic operation like addition and multiplication. Step 4: Final result is the addition of intermediate remainder and simple expression carried out by using addition and multiplication. Figure 2. Flow diagram of high radis Montgomery multiplication. Following flow diagram describes the operation of modular addition. Step1: Choose highest prime number of A, B and P. Step2: Then separately calculate remainder value corresponding input A and B. Step3: Finally, add those values to obtain modular addition. Sl. No. Instruction Operation 1. Addition A + B mod P – Prime field 2. Subtraction A – B mod P – Prime field 3. Multiplication A*B mod p – Prime field 4. High Radix Montgomery Multiplication (AB+CD) R-1 – Prime field 5. Galois field Multiplication A * B – Binary extension field GF(2m ) 6. Arithmetic and logical, shift & rotate, LOAD, STORE – General Instruction Set This includes +, -, *, /, &, |, ^, >>, << START INPUT: A, B, C, D, P1, P2, R OUTPUT: (AB + CD) R-1 STOP Count <= 6 Q[count] = S[count] mod 2R S[count] = (S[count] >> R) + (Q[count] * P2) + (A[count] * B) +(C[count] * D) S[8] = S[7] + (Q[6] * P1) Out = S[8]
  • 3. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 157 – 161 _______________________________________________________________________________________________ 159 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Figure 3. Modular addition. Following flow diagram describes the operation of modular subtraction. Step1: Choose highest prime number of A, B and P. Step2: Then separately calculate remainder value corresponding input A and B. Step3: Finally, subtract those values to obtain modular Subtraction. Figure 4. Modular subtraction. The binary extension field instruction has been explained with flow diagram shown in figure 5. And its steps are as follows: Step 1: Choose A, B and P prime values. Step 2: Using Look Up table based design; its corresponding output will be obtained. Figure 5. Galois multiplication GF (2M ). III. RESULTS ANS DISCUSSION The simulation result can describe how the designs can response for a different input stream at various time incidents. With the application of an input to the system, it is possible by writing test bench for a designed system. In a simulated window there are details which clearly show that at how next modules responds as per the input given for each module. Figure 6. Simulation result of the proposed Crypto processor. Above screenshot shows the result of crypto-processor, in which clock and reset are operating signal of the processor. The clocks can able to provide 20ns with 50% duty cycle. A reset signal is used to start a processor from the initial value. An Opcode has been used to define which operation currently the processor is executing. The data_out signal represents the output of the processor. The operands for processors are fetched from data memory. Examine the simulation result with an example, for Opcode input is 0, it could perform addition of two numbers, namely data1 is in decimal „1‟ and data2 is decimal „1000‟, it will be added and the result is 1001. For Opcode input is 18, it could perform prime field high radix Montgomery multiplication. This multiplication needs two prime numbers, namely P1 and P2 also it needs four data inputs and its result is 721344. For an Opcode input is 19, it could perform binary extension field multiplication. It needs two operands and its START INPUT: A, B, P OUTPUT: A+ B mod P C1 = A mod P C2 = B mod P STOP C = C1 + C2 START INPUT: A, B, P OUTPUT: A- B mod P C1 = A mod P C2 = B mod P STOP C = C1 - C2 START INPUT: A, B OUTPUT: C C = LUT[A][B] STOP
  • 4. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 157 – 161 _______________________________________________________________________________________________ 160 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ output taken from Lookup table. Its output is 8, for an input 1 and 8. Once designs are verified using simulation tools, it is time to synthesis a design. Synthesis means that HDL code can be converted into the RTL schematic, so that design can easily implement on any FPGA. The following screen shot has taken for this particular device Virtex5-XC5VLX30-FF324-3. Figure 7. RTL view of Crypto processor. This result shows the top module of our Crypto-processor, this shows all input and output of the Crypto-processor. Once our HDL code can be converted to RTL as shown in above Figure 7, this can be implemented on any FPGA. This shows the internal design of our Crypto-processor. This internal schematic shows how data are connected between modules. The Crypto-processor consists of data memory, instruction memory, instruction decoder, ALU, program counter and temporary memory. These details are shown in the following Figure 8. After completing synthesis, we get design summary, timing summary and details of combinational and sequential logic utilized by design. An area result obtained by the crypto- processor as taken Virtex5 as a target device. As per calculation 56% of the area has occupied by a Crypto-processor. Figure 8. Internal modules of Crypto processor. Figure 9. Device utilization summary of a Crypto processor. Figure 10. Timing summary of a Crypto processor. This HDL synthesis report details gives us knowledge about how much combinational and sequential logic that has been used by the Crypto-processor. Combinational logic includes adder/subtractors, multiplier, multiplexer and logic gate. Similarly sequential logic includes counters, registers and latches. Figure 11. Macro static details of a Crypto processor. IV. CONCLUSION A Crypto-processor prototype design has been made and synthesized. It can be able to execute unified field instruction. To achieve creditable performance and having both instruction set in single processor architecture, had invoked both prime and binary field algorithms into single processor. Also, this design used high radix Montgomery multiplication to make pairing
  • 5. International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 10 157 – 161 _______________________________________________________________________________________________ 161 IJRITCC | October 2017, Available @ http://www.ijritcc.org _______________________________________________________________________________________ computation to attain system as fast as possible. Consequentially, this design is very useful for simulation and synthesis tools for analyzing this architecture and it has been occupied 56% area and timing it is also achieved credibly equally to known architecture. In future, it could add few more instructions like Modular exponential and Modular inversion. Also to increase the number of pipeline stages to make better performance. For papers published in translation journals, please give the English citation first, followed by the original foreign-language citation [6]. V. REFERENCES [1] V. Bunimov and M. Schimmler, “Area and time efficient modular multiplication of large integers”, in Proc. IEEE Int. Conf. Application-specific systems, architectures, and processors, ASAP 2003, The Hague, Netherlands, 2003, pp. 400-409. [2] R. C. C. Cheung, Sylvain Duquesne, Junfeng Fan, Nicolas Guillermin, Ingrid Verbauwhede, and Gavin Xiaoxu Yao, “FPGA implementation of pairings using residue number system and lazy reduction”, in Proc. 13th Int. Conf. on Cryptographic hardware and embedded systems, Nara, Japan, 2011, pp. 421– 441. [3] J. Fan, F. Vercauteren, and I. Verbauwhede, “Efficient hardware implementation of Fp-Arithmetic for pairing-friendly curves”, IEEE Transactions on Computers., vol. 61, no. 5, pp. 676-685, 2012. [4] S. Ghosh, D. Mukhopadhyay, and D. Roy Chowdhury, “High speed flexible pairing cryptoprocessor on FPGA platform”, in Proc. 4th Int. Conf. on Pairing-based cryptography, Pairing 2010, Japan, 2010, pp. 450–466. [5] H. Wu, “Bit-parallel finite field multiplier and squarer using polynomial basis”, IEEE Transactions on Computers, vol. 51, no. 7, pp. 750-758, 2002. [6] J. Han, Y. Li, Z. Yu, and X. Zeng, “A 65nm cryptographic processor for high speed pairing computation”, IEEE Transactions on VLSI systems, vol. 23, no. 4, pp. 692-701, 2014. [7] D. Kammler, D. Zhang, P. Schwabe, H. Scharwaechter, M. Langenberg, D. Auras, G. Ascheid, and R. Mathar, “Designing an ASIP for cryptographic pairing over Barreto-Naehrig curves”, in Proc. 11th Int. workshop on Cryptographic hardware and embedded systems, Switzerland, 2009, pp. 254-271. [8] Y. Li, J. Han, S. Wang, and D. Fang, “An 800Mhz cryptographic pairing processor in 65nm CMOS”, in Proc. IEEE Asian Conf. on Solid State Circuits, Kobe, 2012, pp. 217-220. [9] O. Nibouche, A. Bouridane, and M. Nibouche, “Architectures for Montgomery‟s multiplication”, in Proc. IEE Computers and digital techniques, vol. 150, no. 6, 2003, pp. 361-368. [10] J. Fan, F. Vercauteren, and I. Verbauwhede, “Faster Fp – arithmetic for cryptographic pairing on Barreto-Naehrig curves”, in Proc. 11th Int. workshop on Cryptographic hardware and embedded systems, Switzerland, 2009, pp. 240-253.