Loading [MathJax]/extensions/MathZoom.js
The Software/Hardware Co-Design and Implementation of SM2/3/4 Encryption/Decryption and Digital Signature System | IEEE Journals & Magazine | IEEE Xplore

The Software/Hardware Co-Design and Implementation of SM2/3/4 Encryption/Decryption and Digital Signature System


Abstract:

The security of smart devices is facing great challenges. This article presents a new hybrid cipher framework suitable for such devices. Using software/hardware (SW/HW) c...Show More

Abstract:

The security of smart devices is facing great challenges. This article presents a new hybrid cipher framework suitable for such devices. Using software/hardware (SW/HW) co-design method, an efficient encryption/decryption and digital signature scheme based on SM2, SM3, and SM4 algorithms is implemented. First, the framework is partitioned into software and hardware parts based on the analysis result of a pure software solution and the hardware overhead under the conditions of design constraints. Second, the flow of the whole scheme and embedded algorithms are realized by SW/HW co-design. Finally, an improved implementation of SM2/3/4 algorithms is proposed to achieve higher efficiency. In this implementation, some SW/HW modules are parallelized to reduce the running time and enhance the performance. The proposed design is safe and can resist simple power analysis (SPA) attacks. Especially, the AHB bus interface IP and software scheduling approach are adopted in data transfer and manipulation. The design is taped-out on a silicon chip with SMIC 110-nm technology process. The chip uses about 199K logic gates and 1-mm2 areas. The operating frequency of the design is 36 MHz and the chip consumes 23-mW power. The comparison with similar previous works shows our proposed design is more efficient with speed increasing of more than 10%.
Page(s): 2055 - 2066
Date of Publication: 04 September 2019

ISSN Information:

Funding Agency:


I. Introduction

Cryptography techniques have been recognized as an important aspect in the field of information security [1]. There are three types of cryptographic algorithms: 1) symmetric algorithms; 2) asymmetric cryptographic algorithms; and 3) hash algorithm. The related typical algorithms are AES [2], ECC [3], and SHA-256 [4], respectively. The SM2 digital signature algorithm, SM3 hash algorithm, and SM4 block cipher algorithm are published by Security Commercial Code Administration Office of China. The SM2/3/4 algorithms are also recognized by the ISO/IEC international standard [5]–[7] and will gradually be widely used.

References

References is not available for this document.