Scalable security processor design and its implementation

Chen Hsing Wang, Jen Chieh Yeh, Chih Tsun Huang, Cheng Wen Wu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

This paper presents a security processor to accelerate cryptographic processing in modern security applications. Our security processor is capable of popular cryptographic functions such as RSA, AES, hashing and random number generation, etc. With proposed Crypto-DMA controller, data gathering and scattering become flexible for security processing, using a simple descriptor-based programming model. The architecture of the security processor with its core-based platform is scalable and configurable for security variations in performance, cost and power consumption. Different number of data channels and crypto-engines can be used to meet the specifications. In addition, a DFT (design for test) platform is also implemented for the design-test integration. The security processor has been fabricated (using UMC 0.18μm CMOS technology) and measured. The core area is 3.899mm × 2.296mm (525K gates approximately) and the operating clock rate is 66MHz.

Original languageEnglish
Title of host publication2005 IEEE Asian Solid-State Circuits Conference, ASSCC 2005
PublisherIEEE Computer Society
Pages513-516
Number of pages4
ISBN (Print)0780391624, 9780780391628
DOIs
Publication statusPublished - 2006 Dec 1
Event1st IEEE Asian Solid-State Circuits Conference, ASSCC 2005 - Hsinchu, Taiwan
Duration: 2005 Nov 12005 Nov 3

Publication series

Name2005 IEEE Asian Solid-State Circuits Conference, ASSCC 2005

Other

Other1st IEEE Asian Solid-State Circuits Conference, ASSCC 2005
CountryTaiwan
CityHsinchu
Period05-11-0105-11-03

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering
  • Electronic, Optical and Magnetic Materials

Fingerprint Dive into the research topics of 'Scalable security processor design and its implementation'. Together they form a unique fingerprint.

  • Cite this

    Wang, C. H., Yeh, J. C., Huang, C. T., & Wu, C. W. (2006). Scalable security processor design and its implementation. In 2005 IEEE Asian Solid-State Circuits Conference, ASSCC 2005 (pp. 513-516). [4017644] (2005 IEEE Asian Solid-State Circuits Conference, ASSCC 2005). IEEE Computer Society. https://doi.org/10.1109/ASSCC.2005.251790