Title :
System design methodologies for a wireless security processing platform
Author :
Ravi, Srivaths ; Raghunathan, Anand ; Potlapally, Nachiketh ; Sankaradass, Murugan
Author_Institution :
C&C Res. Labs, NEC USA, Princeton, NJ, USA
Abstract :
Security protocols are critical to enabling the growth of a wide range of wireless data services and applications. However, they impose a high computational burden that is mismatched with the modest processing capabilities and battery resources available on wireless clients. Bridging the security processing gap, while retaining sufficient programmability in order to support a wide range of current and future security protocol standards, requires the use of novel system architectures and design methodologies. We present the system-level design methodology used to design a programmable security processor platform for next-generation wireless handsets. The platform architecture is based on (i) a configurable and extensible processor that is customized for efficient domain-specific processing, and (ii) layered software libraries implementing cryptographic algorithms that are optimized to the hardware platform. Our system-level design methodology enables the efficient co-design of optimal cryptographic algorithms and an optimized system architecture. It includes novel techniques for algorithmic exploration and tuning, performance characterization and macro-modeling of software libraries, and architecture refinement based on selection of instruction extensions to accelerate performance-critical, computation-intensive operations.
Keywords :
circuit CAD; cryptography; embedded systems; hardware-software codesign; microprocessor chips; mobile radio; programmable circuits; protocols; telecommunication computing; telecommunication security; Xtensa T1040 processor; algorithmic exploration; algorithmic tuning; codesign; configurable processor; domain-specific processing; extensible processor; layered software libraries; macro-modeling; next-generation wireless handsets; optimal cryptographic algorithms; optimized system architecture; performance characterization; private-key operations; programmable security processor platform; public-key operations; security protocols; system-level design methodology; wireless data services; Batteries; Communication system security; Computer architecture; Cryptography; Data security; Design methodology; Software algorithms; Software libraries; System-level design; Wireless application protocol;
Conference_Titel :
Design Automation Conference, 2002. Proceedings. 39th
Print_ISBN :
1-58113-461-4
DOI :
10.1109/DAC.2002.1012728