Area-time efficient point multiplication architecture on twisted Edwards curve over general prime field GF(p)$$ GF(p) $$

被引:9
作者
Javeed, Khalid [1 ]
El-Moursy, Ali [1 ]
机构
[1] Univ Sharjah, Coll Comp & Informat, Dept Comp Engn, Sharjah, U Arab Emirates
关键词
field programmable gate array (FPGA); elliptic curve cryptography (ECC); elliptic curve scalar multiplication; hardware accelerators; unified point addition; SPEED FPGA IMPLEMENTATION; MODULAR MULTIPLICATION; ECC PROCESSOR; CRYPTOGRAPHY; SCHEME;
D O I
10.1002/cta.3708
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Elliptic curve point multiplication is the main primitive required in almost all security schemes using elliptic curve cryptography (ECC). It is the leading computationally intensive operation that sets the overall performance of the associated cryptosystem. This work presents a highly novel area-time efficient elliptic curve point multiplier over a general prime field GF(p)$$ GF(p) $$. It is based on an efficient radix-2(3) parallel GF(p)$$ GF(p) $$ multiplier, which performs a k$$ k $$-bit GF(p)$$ GF(p) $$ multiplication in (k3)$$ \left(\frac{k}{3}\right) $$ clock cycles. On the system level, the twisted Edwards curves with unified point addition using projective coordinates are adopted, where an efficient scheduling technique is presented to schedule several GF(p)$$ GF(p) $$ operations on deployed modular arithmetic units. Due to the introduced optimization at different stages of the design, latency, hardware resource requirement, and total clock cycle count are reduced significantly. Synthesis, and implementation of the proposed design over different Xilinx FPGA platforms are completed using the Xilinx ISE Design Suite tool for key sizes of 192, 224, and 256 bits. The 256-bit Xilinx Virtex-7 FPGA implementation reveals that it completes a single point multiplication operation in 0.8 ms and occupies 6.7K FPGA slices in a clock cycle count of 132.2K. It produces significantly better area-time product and throughput per slice than the contemporary designs. The proposed design also has the potential to counter simple power analysis and timing attacks. Thus, it is an elegant solution to develop ECC-based cryptosystems for applications, where both speed and hardware resource consumption are important.
引用
收藏
页码:5962 / 5979
页数:18
相关论文
共 58 条
  • [1] Efficient implementation of Montgomery modular multiplier on FPGA
    Abd-Elkader, Ahmed A. H.
    Rashdan, Mostafa
    Hasaneen, El-Sayed A. M.
    Hamed, Hesham F. A.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2022, 97
  • [2] Lightweight elliptic curve cryptography accelerator for internet of things applications
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    [J]. AD HOC NETWORKS, 2020, 103
  • [3] Elliptic Curve Lightweight Cryptography: A Survey
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    [J]. IEEE ACCESS, 2018, 6 : 72514 - 72550
  • [4] High-throughput multi-key elliptic curve cryptosystem based on residue number system
    Asif, Shahzad
    Hossain, Md Selim
    Kong, Yinan
    [J]. IET COMPUTERS AND DIGITAL TECHNIQUES, 2017, 11 (05) : 165 - 172
  • [5] High-Speed and Unified ECC Processor for Generic Weierstrass Curves over GF(p) on FPGA
    Awaludin, Asep Muhamad
    Larasati, Harashta Tatimma
    Kim, Howon
    [J]. SENSORS, 2021, 21 (04) : 1 - 20
  • [6] Baldwin B, 2009, LECT NOTES COMPUT SC, V5453, P355, DOI 10.1007/978-3-642-00641-8_41
  • [7] Barker E., 2012, NIST, DOI [DOI 10.6028/NIST.SP.800-57PT1R4, 10.6028/NIST.SP.800-57pt1r4]
  • [8] Barker E., 2018, NIST Special Publication (SP) 800-57
  • [9] Bernstein DJ, 2008, LECT NOTES COMPUT SC, V5023, P389
  • [10] Bernstein Daniel J., 2013, Safecurves: choosing safe curves for ellipticcurve cryptography