Abstract
In this paper we present a design for a crypto-engine. We shall discuss the design and show the instruction set of this coprocessor and then show how this could be used to implement most of the known encryption algorithms. We will discuss why a coprocessor approach may be a better solution than adoption of specific encryption algorithms which can be broken or decertified.
The research reported in this paper was supported in part by NSF grant DCR-8504620.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Motorola Inc, MC68020 32-bit Microprocessor User’s Manual, Prentice-Hall Inc., Englewood Cliffs (1985).
D. Denning, Cryptography and Computer Security, Addison Wesley, Reading, MA (1982).
NBS, “Data Encryption Standard,” National Bureau of standards, FIPS PUB 46, (Jan 1979).
S. C. Pohlig and M. E. Hellman, “An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance,” IEEE Transactions on Information Theory IT-24(January 1978).
A. Shamir, “How to Share a Secret,” Communication of the ACM 22 pp. 612–613 (November 1979).
G. I. Davida, L. D. Wells, and J. B. Kam, “A Database Encryption System with Subkeys,” ACM Trans. on Database Syst. 6(2) pp. 312–328 (June 1981).
P. Scott, “A Fast VLSI Multiplier for GF(2^m),” IEEE Journal on Wed Areas in Communications SAC-4 pp. 62–65 (January 1986).
G. I. Davida and B. Litow, “Fast Parallel Inversion in Finite Fields,” CISS, The Johns Hopkins University, (Davi85).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Davida, G.I., Dancs, F.B. (1988). A Crypto-Engine. In: Pomerance, C. (eds) Advances in Cryptology — CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48184-2_24
Download citation
DOI: https://doi.org/10.1007/3-540-48184-2_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-18796-7
Online ISBN: 978-3-540-48184-3
eBook Packages: Springer Book Archive