Efficient Algorithm and Architecture for Elliptic Curve Cryptographic Processor

- Journal title : JSTS:Journal of Semiconductor Technology and Science
- Volume 16, Issue 1, 2016, pp.118-125
- Publisher : The Institute of Electronics Engineers of Korea
- DOI : 10.5573/JSTS.2016.16.1.118

Title & Authors

Efficient Algorithm and Architecture for Elliptic Curve Cryptographic Processor

Nguyen, Tuy Tan; Lee, Hanho;

Nguyen, Tuy Tan; Lee, Hanho;

Abstract

This paper presents a new high-efficient algorithm and architecture for an elliptic curve cryptographic processor. To reduce the computational complexity, novel modified Lopez-Dahab scalar point multiplication and left-to-right algorithms are proposed for point multiplication operation. Moreover, bit-serial Galois-field multiplication is used in order to decrease hardware complexity. The field multiplication operations are performed in parallel to improve system latency. As a result, our approach can reduce hardware costs, while the total time required for point multiplication is kept to a reasonable amount. The results on a Xilinx Virtex-5, Virtex-7 FPGAs and VLSI implementation show that the proposed architecture has less hardware complexity, number of clock cycles and higher efficiency than the previous works.

Keywords

Elliptic curve cryptography;point multiplication;bit-serial;architecture;

Language

English

References

1.

G. D. Sutter, J.-P. Deschamps, and J. L. Imana, "Efficient Elliptic Curve Point Multiplication using Digit-Serial Binary Field Operations," IEEE Trans. on Industrial Electronics, vol. 60, no.1, pp. 217-225, Jan. 2013.

2.

N. Koblitz, A. Menezes, and S. Vanstone, "The state of elliptic curve cryptography," Des. Codes Cryptography, vol. 19, no. 2-3, pp. 173-193, Mar. 2000.

3.

R. Hankerson, A. Menezes, and S. Vanstone, Guide to Elliptic Curve Cryptography. New York: Springer-Verlag, 2004.

4.

J.-P. Deschamps, J. L. Imana, and G. D. Sutter, Hardware Implementation of Finite-Field Arithmetic. New York: McGraw-Hill, 2009, ser. Electronic Engineering Series.

5.

W. N. Chelton and M. Benaissa, "Fast elliptic curve cryptography on FPGA," IEEE Trans. on Very Large Scale Integrated (VLSI) Systems, vol. 16, no. 2, pp. 198-205, Feb. 2008.

6.

F. Rodriguez-Henriquez, N. A. Saqib, and A. Diaz-Perez, "A fast parallel implementation of elliptic curve point multiplication over GF(2m)," Micro- process. Microsyst., vol. 28, no. 5-6, pp. 329-339, Aug. 2004, Special issue on FPGAs: Applications and Designs.

7.

S. M. Shohdy, A. B. El-Sisi, and N. Ismail, "FPGA implementation of elliptic curve point multiplication over $GF(2^{191})$ ," Proc. 3rd Int. Conf. Workshops Adv. ISA, Berlin, Heidelberg, Germany, pp. 619-634, Jun. 2009.

8.

H. Mahdizadeh and M. Masoumi, "Novel Architecture for Efficient FPGA Implementation of Elliptic Curve Cryptographic Processor Over $GF(2^{163})$ ," IEEE Trans. on Very Large Scale Integration (VLSI) Systems, vol. 21, no. 12, pp. 2330-2333, Dec. 2013.

9.

J.-C. Bajard, L. Imbert, and C. Negre, "Arithmetic Operations in Finite Fields of Medium Prime Characteristic Using the Lagrange Representation," IEEE Trans. on Computer, vol. 55, no. 9, pp. 1167-1177, Sep. 2006.

10.

A. Hariri and A. Reyhani-Masoleh, "Bit-Serial and Bit-Parallel Montgomery Multiplication and Squaring over $GF(2^m)$ ," IEEE Trans. on Computer, vol. 58, no. 10, pp. 1332-1345, Oct. 2009.

11.

C.W. Chiou, C.-Y. Lee, J.-M. Lin, T.-W. Hou, C.-C. Chang, "Concurrent error detection and correction in dual basis multiplier over $GF(2^m)$ ," IET Circuits, Devices & Systems, vol. 3, no. 1, pp. 22-40, Feb. 2009.

12.

G. Meurice de Dormale and J.-J. Quisquater, "High-speed hardware implementations of elliptic curve cryptography: A survey," J. Syst. Archit., vol. 53, no. 2-3, pp. 72-84, Feb./Mar. 2007.

13.

H. Li, K. Wu, G. Xu, H. Yuan and P. Luo, "Simple Power Analysis Attacks Using Chosen Message against ECC Hardware Implementations," IEEE World Congress on Internet Security, pp. 68-72, Feb. 2011.

14.

J. P. Deschamps, J. L. Imana, and G. D. Sutter,, "Hardware Implementation of Finite-Field Arithmetic" McGrawHill, ISBN 978-0-0715-4581-5, Mar. 2009.

15.

R. Azarderakhsh, K. U. Jarvinen, and M. M.-Kermani, "Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Application," IEEE Trans. on Circuits and Systems-I, vol. 64, no. 4, pp. 1144-1155, Apr. 2014.

16.

U. Kocabas, J. Fan, and I. Verbauwhede, "Implementation of binary Edwards curves for very-constrained devices," Proc. 21st Int. Conf. Application-Specific Systems Architectures and Processors (ASAP2010), pp. 185-191, Jul. 2010.