Area-Time-Efficient High-Radix Modular Inversion Algorithm and Hardware Implementation for ECC over Prime Fields

被引:0
作者
Li, Yamin [1 ]
机构
[1] Hosei Univ, Fac Comp & Informat Sci, Dept Comp Sci, Comp Architecture Lab, Tokyo 1848584, Japan
关键词
computer security; elliptic curve cryptography; modular inversion; hardware; Verilog HDL; FPGA; cost performance evaluation; PERFORMANCE;
D O I
10.3390/computers13100265
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Elliptic curve cryptography (ECC) is widely used for secure communications, because it can provide the same level of security as RSA with a much smaller key size. In constrained environments, it is important to consider efficiency, in terms of execution time and hardware costs. Modular inversion is a key time-consuming calculation used in ECC. Its hardware implementation requires extensive hardware resources, such as lookup tables and registers. We investigate the state-of-the-art modular inversion algorithms, and evaluate the performance and cost of the algorithms and their hardware implementations. We then propose a high-radix modular inversion algorithm aimed at reducing the execution time and hardware costs. We present a detailed radix-8 hardware implementation based on 256-bit primes in Verilog HDL and compare its cost performance to other implementations. Our implementation on the Altera Cyclone V FPGA chip used 1227 ALMs (adaptive logic modules) and 1037 registers. The modular inversion calculation took 3.67 ms. The AT (area-time) factor was 8.30, outperforming the other implementations. We also present an implementation of ECC using the proposed radix-8 modular inversion algorithm. The implementation results also showed that our modular inversion algorithm was more efficient in area-time than the other algorithms.
引用
收藏
页数:30
相关论文
共 20 条
[1]  
Barker E., 2018, SP 800-56A Rev. 3, Recommendation for Pair-Wise Key-Establishment Schemes Using Discrete Logarithm Cryptography
[2]  
Burton D., 2011, The History of Mathematics/An Introduction, V7th ed., DOI [10.1086/355470, DOI 10.1086/355470]
[3]  
Certicom Corp, 2010, SEC 2: Recommended Elliptic Curve Domain Parameters
[4]   Efficient Design and Performance Analysis of a Hardware Right-shift Binary Modular Inversion Algorithm in GF(p) [J].
Choi, Piljoo ;
Lee, Mun-Kyu ;
Kong, Jeong-Taek ;
Kim, Dong Kyue .
JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2017, 17 (03) :425-437
[5]  
Chuanpeng Chen, 2009, Proceedings of the 2009 Second International Conference on Intelligent Networks and Intelligent Systems (ICINIS 2009), P43, DOI 10.1109/ICINIS.2009.20
[6]  
Daly A., 2005, New Algorithms, Architectures and Applications for Reconfigurable Computing, P219, DOI [10.1007/1-4020-3128-918, DOI 10.1007/1-4020-3128-918]
[7]   An Efficient FPGA Implementation of ECC Modular Inversion over F256 [J].
Dong, Xiuze ;
Zhang, Li ;
Gao, Xianwei .
ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, :29-33
[8]   An Efficient Hardware Design of Prime Field Modular Inversion/Division for Public Key Cryptography [J].
Guo, Kai-Yuan ;
Fang, Wai-Chi ;
Fahier, Nicolas .
2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS, 2023,
[9]  
Hankerson D., 2004, GUIDE ELLIPTIC CURVE, P1, DOI DOI 10.1007/B97644
[10]   Lightweight Architecture for Elliptic Curve Scalar Multiplication over Prime Field [J].
Hao, Yue ;
Zhong, Shun'an ;
Ma, Mingzhi ;
Jiang, Rongkun ;
Huang, Shihan ;
Zhang, Jingqi ;
Wang, Weijiang .
ELECTRONICS, 2022, 11 (14)