Optimized design method on elliptic curve cryptography

被引:0
作者
Cui, Xining [1 ,2 ]
Yang, Jingwei [3 ]
Ye, Hong [2 ]
Dai, Xiaodi [2 ]
机构
[1] School of Computer Science and Technology, Xidian Univ., Xi'an
[2] Aeronautics Computing Technique Research Institute, Xi'an
[3] School of Computer Science and Engineering,, Beihang Univ.,, Beijing
来源
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University | 2015年 / 42卷 / 01期
关键词
ECC; Elliptic curve; FPGA; Point multiplication;
D O I
10.3969/j.issn.1001-2400.2015.01.011
中图分类号
学科分类号
摘要
Elliptic Curve Cryptography algorithm, which depends on the difficulty of the discrete logarithm problem, has some characteristics of low computational overhead and high security. The main operation of Elliptic Curve Cryptography is point multiplication which is the most time-consuming part in the encryption and decryption process. This paper optimizes the point multiplication, proposes a hardware architecture to implement Elliptic Curve Cryptography algorithm and designs encryption and decryption system basing on FGPA. The proposed method improves the encryption and decryption efficiency by the multiplication, squaring and division optimization in the finite binary field. Analysis and testing show that the proposed architecture has some advantages with low hard resource consumption, low complexity of module interface and scalability, the designed encryption and decryption system supports key length of 113 bit, 163 bit, 193 bit and so on, and relative to the software Elliptic Curve Cryptography system running on embedded processor, this encryption and decryption processor can achieve thousands of times faster. ©, 2014, Science Press. All right reserved.
引用
收藏
页码:69 / 74
页数:5
相关论文
共 9 条
  • [1] Koblitz N., A Course in Number Theory and Cryptography, (1994)
  • [2] Miller V., Uses of Elliptic Curves in Cryptography, Advances in Cryptology CRYPTO'85, pp. 417-426, (1986)
  • [3] Ding Y., Key Management Scheme for WSN Using ECC, Journal of Xidian University, 35, 4, pp. 739-742, (2008)
  • [4] Namal S., Georgantas K., Gurtov A., Lightweight Authentication and Key Management on 802.11 with Elliptic Curve Cryptography, IEEE Wireless Communications and Networking Conference, pp. 1830-1835, (2013)
  • [5] Kodali R.K., Budwal H.S., High Performance Scalar Multiplication for ECC, International Conference on Computer Communication and Informatics, pp. 1-4, (2013)
  • [6] Lopez J., Dahab R., Improved Algorithms for Elliptic Curve Arithmetic in GF(2<sup>n</sup>), Lecture Notes In Computer Science: 1556, pp. 201-212, (1988)
  • [7] Lu C.Y., Jen S.M., Laih C.S., A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication, IEEE Transactions on Computers, 62, 3, pp. 428-438, (2013)
  • [8] Lopez J., Dahab R., Fast Multiplication on Elliptic Curves over GF (2m) without Pre Computation, Workshop on Cryptographic Hardware and Embedded Systems, pp. 316-327, (1999)
  • [9] Standards for Efficient Cryptography, (2000)