Masters Theses
Date of Award
12-2005
Degree Type
Thesis
Degree Name
Master of Science
Major
Computer Engineering
Major Professor
Don Bouldin
Committee Members
Gregory Peterson, Itamar Elhanany
Abstract
Traditional public key cryptographic methods provide access control to sensitive data by allowing the message sender to grant a single recipient permission to read the encrypted message. The Need2Know® system (N2K) improves upon these methods by providing role-based access control. N2K defines data access permissions similar to those of a multi-user file system, but N2K strictly enforces access through cryptographic standards. Since custom hardware can efficiently implement many cryptographic algorithms and can provide additional security, N2K stands to benefit greatly from a hardware implementation. To this end, the main N2K algorithm, the Key Protection Module (KPM), is being specified in VHDL. The design is being built and tested incrementally: this first phase implements the core control logic of the KPM without integrating its cryptographic sub-modules. Both RTL simulation and formal verification are used to test the design. This is the first N2K implementation in hardware, and it promises to provide an accelerated and secured alternative to the software-based system. A hardware implementation is a necessary step toward highly secure and flexible deployments of the N2K system.
Recommended Citation
Fields, Scott Edward, "Hardware Design and Implementation of Role-Based Cryptography. " Master's Thesis, University of Tennessee, 2005.
https://trace.tennessee.edu/utk_gradthes/1880