dc.contributor.advisor | Nandy, S K | |
dc.contributor.advisor | Jamadagni, H S | |
dc.contributor.author | Das, Saptarsi | |
dc.date.accessioned | 2013-07-03T06:37:38Z | |
dc.date.accessioned | 2018-07-31T04:34:25Z | |
dc.date.available | 2013-07-03T06:37:38Z | |
dc.date.available | 2018-07-31T04:34:25Z | |
dc.date.issued | 2013-07-03 | |
dc.date.submitted | 2011 | |
dc.identifier.uri | https://etd.iisc.ac.in/handle/2005/2100 | |
dc.identifier.abstract | http://etd.iisc.ac.in/static/etd/abstracts/2701/G24770-Abs.pdf | en_US |
dc.description.abstract | Cryptography algorithms like the Advanced Encryption Standard, Elliptic Curve Cryptography algorithms etc are designed using algebraic properties of finite fields. Thus performance of these algorithms depend on performance of the underneath field operations. Moreover, different algorithms use finite fields of widely varying order. In order to cater to these finite fields of different orders in an area efficient manner, it is necessary to design solutions in the form of hardware-consolidations, keeping the performance requirements in mind. Due to their small area occupancy and high utilization, such circuits are less likely to stay idle and therefore are less prone to loss of energy due to leakage power dissipation. There is another class of applications that rely on finite field algebra namely the various error detection and correction techniques. Most of the classical block codes used for detection of bit-error in communications over noisy communication channels apply the algebraic properties of finite fields. Cyclic redundancy check is one such algorithm used for detection of error in data in computer network. Reed-Solomon code is most notable among classical block codes because of its widespread use in storage devices like CD, DVD, HDD etc.
In this work we present the architecture of a polymorphic multiplier for operations over various extensions of GF(2). We evolved the architecture of a textbook shift-and-add multiplier to arrive at the architecture of the polymorphic multiplier through a generalized mathematical formulation. The polymorphic multiplier is capable of morphing itself in runtime to create data-paths for multiplications of various orders. In order to optimally exploit the resources, we also introduced the capability of sub-word parallel execution in the polymorphic multiplier. The synthesis results of an instance of such a polymorphic multipliershowsabout41% savings in area with 21% degradation in maximum operating frequency compared to a collection of dedicated multipliers with equivalent functionality. We introduced the multiplier as an accelerator unit for field operations in the coarse grained runtime reconfigurable platform called REDEFINE. We observed about 40-50% improvement in performance of the AES algorithm and about 52×improvement in performance of Karatsuba-Ofman multiplication algorithm. | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | G24770 | en_US |
dc.subject | Mobile Communication - Security | en_US |
dc.subject | Poymorphic Multiplier | en_US |
dc.subject | Finite Field Arithmetic | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Elliptic Curve Cryptography (ECC) | en_US |
dc.subject | Public Key Cryptography Algorithms | en_US |
dc.subject | Elliptic Curve Diffie-Hellman Algorithm (ECDHA) | en_US |
dc.subject | Elliptic Curve Digital Signature Algorithm (ECDSA) | en_US |
dc.subject.classification | Communication Engineering | en_US |
dc.title | A Polymorphic Finite Field Multiplier | en_US |
dc.type | Thesis | en_US |
dc.degree.name | MSc Engg | en_US |
dc.degree.level | Masters | en_US |
dc.degree.discipline | Faculty of Engineering | en_US |