رسالة جامعية

Low-complexity, low-area computer architectures for cryptographic application in resource constrained environments

التفاصيل البيبلوغرافية
العنوان: Low-complexity, low-area computer architectures for cryptographic application in resource constrained environments
المؤلفون: Kong, Jia Hao
بيانات النشر: University of Nottingham, 2018.
سنة النشر: 2018
المجموعة: Ethos UK
Original Material: http://eprints.nottingham.ac.uk/45394Test/
مصطلحات موضوعية: TK Electrical engineering. Electronics Nuclear engineering
الوصف: RCE (Resource Constrained Environment) is known for its stringent hardware design requirements. With the rise of Internet of Things (IoT), low-complexity and low-area designs are becoming prominent in the face of complex security threats. Two low-complexity, low-area cryptographic processors based on the ultimate reduced instruction set computer (URISC) are created to provide security features for wireless visual sensor networks (WVSN) by using field-programmable gate array (FPGA) based visual processors typically used in RCEs. The first processor is the Two Instruction Set Computer (TISC) running the Skipjack cipher. To improve security, a Compact Instruction Set Architecture (CISA) processor running the full AES with modified S-Box was created. The modified S-Box achieved a gate count reduction of 23% with no functional compromise compared to Boyar’s. Using the Spartan-3L XC3S1500L-4-FG320 FPGA, the implementation of the TISC occupies 71 slices and 1 block RAM. The TISC achieved a throughput of 46.38 kbps at a stable 24MHz clock. The CISA which occupies 157 slices and 1 block RAM, achieved a throughput of 119.3 kbps at a stable 24MHz clock. The CISA processor is demonstrated in two main applications, the first in a multilevel, multi cipher architecture (MMA) with two modes of operation, (1) by selecting cipher programs (primitives) and sharing crypto-blocks, (2) by using simple authentication, key renewal schemes, and showing perceptual improvements over direct AES on images. The second application demonstrates the use of the CISA processor as part of a selective encryption architecture (SEA) in combination with the millions instructions per second set partitioning in hierarchical trees (MIPS SPIHT) visual processor. The SEA is implemented on a Celoxica RC203 Vertex XC2V3000 FPGA occupying 6251 slices and a visual sensor is used to capture real world images. Four images frames were captured from a camera sensor, compressed, selectively encrypted, and sent over to a PC environment for decryption. The final design emulates a working visual sensor, from on node processing and encryption to back-end data processing on a server computer.
Original Identifier: oai:ethos.bl.uk:734399
نوع الوثيقة: Electronic Thesis or Dissertation
الإتاحة: http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.734399Test
رقم الانضمام: edsndl.bl.uk.oai.ethos.bl.uk.734399
قاعدة البيانات: Networked Digital Library of Theses & Dissertations