High-speed hardware architecture design and implementation of Ed25519 signature verification algorithm

被引:0
作者
Xue Y. [1 ]
Liu S. [1 ]
Guo S. [1 ]
Li Y. [2 ]
Hu C. [3 ]
机构
[1] College of Information and Electrical Engineering, China Agricultural University, Beijing
[2] College of Science, China Agricultural University, Beijing
[3] State Grid Beijing Electric Power Company, Beijing
来源
Tongxin Xuebao/Journal on Communications | 2022年 / 43卷 / 03期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Digital signature; Edwards-curve; Hardware implementation; Multiple point multiplication;
D O I
10.11959/j.issn.1000-436x.2022061
中图分类号
学科分类号
摘要
Aiming at the high performance requirements of signature verification for specific scenarios such as blockchain, a high-speed hardware architecture of Ed25519 was proposed. To reduce the number of calculations for point addition and point double, a multiple point multiplication algorithm based on interleaving NAF was conducted by using pre-computation and lookup tables. The modular multiplication operation was realized by using the Karatsuba multiplication and fast reduction method, and the point addition and point double operation was designed without modular addition and subtraction, which could effectively improve the performance of point addition and point double. Given that modular exponentiation was the most time-consuming operation in the decompression process, a new modular exponentiation approach was developed by parallelizing modular inverse and modular multiplication, and therefore the performance of the de-compression operation could be improved. The proposed architecture fully considers the use of resources and is implemented on the Zynq-7020 FPGA platform with 13 695 slices, achieving 8 347 verifications per second at 81.6 MHz. © 2022, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:101 / 112
页数:11
相关论文
共 22 条
[1]  
KOBLITZ N., Elliptic curve cryptosystems, Mathematics of Computation, 48, 177, pp. 203-209, (1987)
[2]  
MILLER V S., Use of elliptic curves in cryptography, Lecture Notes in Computer Science, pp. 417-426, (1986)
[3]  
WANG J, WU L B, LUO M, Et al., Secure and efficient two-party ECDSA signature scheme, Journal on Communications, 42, 2, pp. 12-25, (2021)
[4]  
BERNSTEIN D J, DUIF N, LANGE T, Et al., High-speed high-security signatures, Journal of Cryptographic Engineering, 2, 2, pp. 77-89, (2012)
[5]  
JOSEFSSON S, LIUSVAARA I., Edwards-curve digital signature algorithm (EdDSA), (2017)
[6]  
GAYOSO M V, HERNANDEZ E L, MARTIN M A, Et al., Secure elliptic curves and their performance, Logic Journal of the IGPL, 27, 2, pp. 277-238, (2018)
[7]  
YAO Q, ZHANG D W., Survey on identity management in blockchain, Journal of Software, 32, 7, pp. 2260-2286, (2021)
[8]  
RESCORLA E., The transport layer security (TLS) protocol version 1.3, (2018)
[9]  
GROBSCHADL J, FRANCK C, LIU Z., Lightweight EdDSA signature verification for the ultra-low-power Internet of things, Information Security Practice and Experience, pp. 263-282, (2021)
[10]  
FAZ-HERNANDEZ A, LOPEZ J, DAHAB R., High-performance implementation of elliptic curve cryptography using vector instructions, ACM Transactions on Mathematical Software, 45, 3, pp. 1-35, (2019)