Professional Documents
Culture Documents
A TECHNICAL PAPER
ON
EMBEDDED SYSTEMS
By
M.Kishore Naik
&
K.Rajasekhar
ABSTRACT
INTRODUCTION
The ECDSA scheme consists of three main functions, which are Key Pair Generation,
signature Signing and Signature Verification as shown in Figure 1.
Device Drivers: These are embedded software executed on the Nios embedded
processor. It ensures the correct execution of the IP cores, and acts as a bridge between
the cipher computation blocks and the software APIs running on the host PC during data
transmission. It also performs pseudo random key generation.
APIs: Application Programming Interface, executed on host PC, to aid application
developers. It performs high-level function such as input file reading and output file
writing. It handles data transfer between the host and the cryptosystem hardware.
The designs of the crypto are described in VHDL (Very High Speed Integration Circuit
Hardware Description Language). Each part of the design is synthesize, functionally
6
7
simulated, place and routing and timing analysis was carried out with QuartusII software
from Altera. The combined architecture was simulated, and then implemented into a
single FPGA chip for hardware validation and evaluated.
Figure 3 shows the software architecture of the ECDSA cryptosystem, illustrating the
device driver (embedded software on Nios CPU) and the software APIs (host PC).
The device driver and API routines perform three main functions, which
are ECC key pair generation based on the specify system parameter, ECDSA digital
signature signing and ECDSA digital signature verification to a file stored in a host PC.
.
The result in Table 1 shows that the speed achieved is extremely promising
for real-time applications. Running on a clock of 40 MHz, the system achieves the
execution time of 0.59 msec for signing, and 1.07msec for signature
verifying,corresponding to throughputs of 1697 and 937 operations/sec respectively.
8
2. Decrypt the encrypted session key using receiver’ s RSA private key to recover session
key.
3. Using the recovered session key to decrypt ciphertext using AES decryption to recover
the examination question.
CONCLUSION
[1] Paul C. van Oorschot, Alfred J. Menezes, and Scott A.Vanstone, 1996. Handbook of
applied Cryptography.CRC press Inc., Florida.
[2] Mohamed Khalil Hani, Hau Yuan Wen, Lim Kie Woon. Public Key Crypto Hardware
for Real-Time Security Application. In Proceedings of the National
Real-Time Technology and Application Symposium (RENTAS2004), 1-6.
[3] Certicom Corporation. April 1997. The Elliptic Curve Cryptosystem – Current
Public-Key Cryptography Schemes