AN AREA-EFFICIENT UNIVERSAL CRYPTOGRAPHY PROCESSOR FOR SMART CARDS
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
01-10-2009, 07:29 AM


AN AREA-EFFICIENT UNIVERSAL CRYPTOGRAPHY PROCESSOR FOR SMART CARDS
Cryptography circuits for smart cards and portable electronic devices provide user authentication and secure data communication. These circuits should, in general, occupy small chip area, consume low power, handle several cryptography algorithms, and provide acceptable performance. This project and implimentation is based on a hardware implementation of three standard cryptography algorithms on a universal architecture.The microcode cryptography processor targets smart card applications and implements both private key and public key algorithms and meets the power and performance specifications. A new algorithm is implemented by changing the contents of the memory blocks that are implemented in ferroelectric RAM ( FeRAM ) .Using FeRAM allows nonvolatile storage of the configuration bits, which are changed only when a new algorithm instantiations required. Security system must implement both private (symmetric) and public ( asymmetric ) key algorithms, to accommodate various application requirements . Private key algorithms with high throughput are suitable for data communication, while public key algorithms with much lower throughput are suitable for private key exchange and authentication. Among all available algorithms data encryption standard (DES), advanced encryption standard (AES), and elliptic curve cryptography(ECC),which are approved by std organizations , are selected for this application. DES, for past compatibility, and AES, for high security and throughput are the major candidates for private key algorithms, and ECC is the best candidate for the public key algorithm for its encryption efficiency. CRYPTOGRAPHY ALGORITHMS¢ DES (Data Encryption Standard)¢ AES (Advanced Encryption Standard)¢ ECC (Elliptic Curve Cryptography
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
aravindkumarmtech
Active In SP
**

Posts: 1
Joined: May 2010
#2
07-05-2010, 05:16 PM

iam doing project and implimentation on cryptogaphy algorithms.
Reply
rvivek02
Active In SP
**

Posts: 1
Joined: Jul 2010
#3
21-07-2010, 09:17 AM

project and implimentation Area-Efficient Universal Cryptography Processor for Smart Cards
Reply
KAILESH
Active In SP
**

Posts: 2
Joined: Dec 2010
#4
26-12-2010, 05:36 PM

I WANT FULL DETAILS AND CIRCIUT DIAGRAM AND METHOD OF IMPLEMENTATION OF
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#5
28-12-2010, 09:46 AM

for more information on SMART CARDS :

topicideashow-to-smart-card-full-report?pid=28872#pid28872
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#6
18-03-2011, 02:27 PM


.doc   Area Efficient Cryptography Processors for Smart Cards.doc (Size: 340.5 KB / Downloads: 50)
ABSTRACT
Cryptography circuits for smart cards and portable electronic devices provide user authentication and secure data communication. These circuits should, in general, occupy small chip area, consume low power, handle several cryptography algorithms, and provide acceptable performance. This paper presents a hardware implementation of three standard cryptography algorithms on a universal architecture.
The microcoded cryptography processor targets smart card applications and implements both private key and public key algorithms and meets the power and performance specifications and is as small as 2.25 mm in 0.18-µm 6LM CMOS. A new algorithm is implemented by changing the contents of the memory blocks that are implemented in ferroelectric RAM (FeRAM). Using FeRAM allows nonvolatile storage of the configuration bits, which are changed only when a new algorithm instantiation is required.
INTRODUCTION
SMART CARDS

• Smart cards are ICC embedded integrated circuits which can process data.
• They can be used for identification, authentication, and data storage and eliminate redundant data entry.
• They are classified as Contactless and Contact
• They enable improvements of business processes by enhancing the services and the security.
CRYPTOGRAPHY
The popularity of the devices like smart cards, cellular phones and PDAs necessitates special considerations for their security subsystems. Thus cryptography gives trust in confidentiality, integrity, and authenticity of these devices.
Since next-generation, multipurpose smart cards will be used for a wide range of applications, their security system must implement both private (symmetric) and public (asymmetric) key algorithms, to accommodate various application requirements.
Private key algorithms with high throughput are suitable for data communication, while public key algorithms with much lower throughput are suitable for private key exchange and authentication.
Among all available algorithms, data encryption standard (DES), advanced encryption standard (AES), and elliptic curve cryptography (ECC), which are approved by standards organizations are selected for this application.
DES, for past compatibility, and AES, for high security and throughput, are the major candidates for private key algorithms, and ECC is the best candidate for the public key algorithm for its encryption efficiency.
RSA, which is also a standard public key algorithm, is not considered in this design for three reasons. First, it is believed that 160-b ECC provides the same level of security as 1024-b RSA. Thus, ECC will be a better choice when implementation area is a key factor in the design. Second, RSA uses binary addition of large numbers and needs binary adderess that are either slow for carry propagation or large for look-ahead carry generation. Third, a larger number of bits in RSA means wider buses, which adds to the area and power consumption of the design, both of which are scarce resources in smart cards.
IMPLEMENTATION
 A cryptography system can be implemented in either software or hardware. Software implementations allow multiple algorithms to be supported on the same hardware platform,but they are usually slow and cannot meet the required specifications. Moreover, they are considered to be more vulnerable to side-channel attacks compared to other implementations.
 Hardware implementations which support high throughput do not allow for flexibility and, hence, are not suitable for smart cards.
 Flexible field-programmable gate array (FPGA) implementations are not a good choice either, because they need large area and power which cannot be supported on smart card.
However, since users and manufacturers are still concerned about the vulnerability of software implementations of the cryptography algorithms to side-channel attacks, it is important to design hardware circuits that meet the required specifications and are more immune to these attacks.
CRYPTOGRAPHY ALGORITHMS
DATA ENCRYPTION STANDARD (DES)

• This is a well-established algorithm that has been used for more than two decades (since 1977) in military and commercial data exchange and storage.
• The algorithm is designed to encipher and decipher blocks of data consisting of 64 b using a 56-b key.
• It uses 2 basic techniques of cryptography: Confusion & Diffusion . Confusion is achieved through numerous permutations & Diffusion is achieved through XOR and Shift operations
• A block to be enciphered is subjected to an initial permutation (IP), then to 16 rounds of a complex key-dependent permutation, and, finally, to another permutation which is the inverse of the IP, IP
Reply
sankarathil2009
Active In SP
**

Posts: 1
Joined: May 2011
#7
09-07-2011, 11:55 AM

ppt,project and implimentation report and code
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SMART QUILL project uploader 1 1,784 01-09-2014, 10:57 AM
Last Post: Guest
  DEVELOPMENT OF SOFTWARE & HARDWARE FOR MICROCONTROLLER BASED SMART NOTICE BOARD (US Electrical Fan 4 4,171 21-12-2013, 05:39 PM
Last Post: kumar.yeshwanth46@gmail.com
  smart card based project and implimentations computer science technology 12 12,062 13-11-2013, 11:22 AM
Last Post: Guest
  Smart and Cost effective Wireless Electronic Notice Board Message updating system seminar projects maker 0 740 26-09-2013, 12:50 PM
Last Post: seminar projects maker
  HUMAN TRACKING SYSTEM FOR SMART FAN AND LIGHTING SYSTEM ppt seminar projects maker 0 489 23-09-2013, 04:36 PM
Last Post: seminar projects maker
  GSM Based Electrical Control System for Smart Home Application pdf seminar projects maker 0 466 21-09-2013, 12:38 PM
Last Post: seminar projects maker
  Design Of 2-D Filters Using A Parallel Processor Architecture Report seminar projects maker 0 318 11-09-2013, 04:23 PM
Last Post: seminar projects maker
  Design of microturbine generator by using matlab Simulink for smart grid study tips 0 781 31-08-2013, 04:42 PM
Last Post: study tips
  AN UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR HOME DEVICES PPT study tips 0 334 17-08-2013, 12:56 PM
Last Post: study tips
Wink can i use a cell phone signal jammer in my personal area? AndyWoods1900 3 1,236 15-08-2013, 12:41 PM
Last Post: chloelly