DocumentCode :
122838
Title :
Data security using serial commutative RSA CORE for multiple FPGA system
Author :
Ambika, R. ; Ramachandran, Siddharth ; Kashwan, K.R.
Author_Institution :
Vinayaka Missions Univ., Salem, India
fYear :
2014
fDate :
6-8 March 2014
Firstpage :
1
Lastpage :
5
Abstract :
Security systems play a vital role in protecting the important data in the organizations or multiple transceiver based communication systems and cryptography is one of the primary ways to protect the data. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. Many cryptographic protocols and attacks on these protocols make use of the fact that the order in which encryption is performed does not affect the result of the encryption, i.e., encryption is commutative. This paper presents the implementation of a cryptography core based on Commutative RSA public key cryptography algorithm for accomplishing data security and authentication in environment comprising multiple FPGA cores without any key exchange overheads. In this work, in spite of considering conventional two terminal communications, we have implemented a scalable architecture for multi distributed FPGA based systems that realizes commutative RSA algorithm for verifying data security among multiple transceiver terminals. The proposed system architecture has used the Montgomery multiplication algorithm with exponential modular multiplication and Radix-2 multiplication based multiparty cryptography. The proposed multiplier is able to work with any precision of the input operands, limited only by memory or control constraints. The result obtained for this approach has illustrated a very high computational efficiency with minimum memory or space occupancy and higher operational frequency.
Keywords :
authorisation; cryptographic protocols; digital arithmetic; field programmable gate arrays; public key cryptography; transceivers; Montgomery multiplication algorithm; commutative RSA public key cryptography algorithm; computational efficiency; control constraint; cryptographic protocols; cryptography core; data authentication; data protection; data security systems; exponential modular multiplication; memory constraint; minimum memory occupancy; minimum space occupancy; multiple distributed FPGA based systems; multiple transceiver based communication systems; operational frequency; radix-2 multiplication based multiparty cryptography; serial commutative RSA CORE; Algorithm design and analysis; Computer architecture; Encryption; Field programmable gate arrays; Public key cryptography; Transceivers; Architecture; Authentication; Commutative RSA; Data Security; Field Programmable Gate Array; Montgomery Multiplication; Radix-2 multiplier;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Devices, Circuits and Systems (ICDCS), 2014 2nd International Conference on
Conference_Location :
Combiatore
Type :
conf
DOI :
10.1109/ICDCSyst.2014.6926198
Filename :
6926198
Link To Document :
بازگشت