Embedded systems for IT security applications: properties and design considerations

  • Authors:
  • Sorin Alexander Huss

  • Affiliations:
  • CASED - Center for Advanced Security Research Darmstadt, Darmstadt, Germany

  • Venue:
  • Proceedings of the 2nd international conference on Security of information and networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Embedded systems aimed for applications in the IT security domain are characterized by specific needs in terms of computing power. The high computational loads stem both from algorithms, which have to address different symmetric and especially asymmetric encryption schemes such as AES, RSA, ECC and PBC, and from associated key size values ranging from 100's to several 1000's bits. This presentation details specific architectural considerations of reconfigurable System-on-Chip implementations aimed to deal with high computational loads. Multiple data paths with pipelining, distributed memory blocks, and multiple processor/coprocessor schemes are presented and demonstrated for several application examples including quantum computing resistant encryption. The design flow for such specific architectures will be addressed by means of a dedicated high-level synthesis tool, which is based on genetic algorithms for the solution of the underlying allocation and scheduling problem.