An Efficient Hardware Design of Prime Field Modular Inversion/Division for Public Key Cryptography

被引:1
作者
Guo, Kai-Yuan [1 ]
Fang, Wai-Chi [1 ]
Fahier, Nicolas [1 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Inst Elect, Hsinchu 30010, Taiwan
来源
2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS | 2023年
关键词
Cryptosystem; Public key cryptography; Elliptic curve digital signature algorithm; Elliptic curve cryptography; Modular inversion; Modular division; Binary inversion algorithm;
D O I
10.1109/ISCAS46773.2023.10181906
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we proposed an area-efficient hardware implementation of modular inversion/division, which is a complex and crucial component in elliptic curve cryptography (ECC). Our modular inversion/division is based on our modified binary inversion algorithm. The proposed hardware implementation of modular inversion/division improves the area efficiency and was designed and implemented on Xilinx Spartan-6 and Virtex-7 field-programmable gate array (FPGA) platforms and simulated with TSMC 90nm and 180nm technology nodes. Our proposed modular inversion/division is suitable for prime fields used in public key cryptography, including the NIST-recommended elliptic curves. It occupies 618 slices and 607 slices in Xilinx Spartan-6 and Virtex-7 FPGA platform, computes in 10.6 mu s and 6.45 over the prime filed P-256, at a maximum operating frequency of 33.76 MHz and 55.49 MHz. It occupies 23997 GE and 28471 GE, computes in 1.25 mu s and 2.43 mu s over the prime fields P-256 at a maximum operating frequency of 285.71 MHz and 147.06 MHZ, respectively for TSMC 90nm and 180nm technology node implementation.
引用
收藏
页数:5
相关论文
共 9 条
[1]   Efficient Design and Performance Analysis of a Hardware Right-shift Binary Modular Inversion Algorithm in GF(p) [J].
Choi, Piljoo ;
Lee, Mun-Kyu ;
Kong, Jeong-Taek ;
Kim, Dong Kyue .
JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2017, 17 (03) :425-437
[2]  
Hankerson D, 2004, Guide to Elliptic Curve Cryptography
[3]   Modular Inverse AlgorithmsWithout Multiplications for Cryptographic Applications [J].
Hars, Laszlo .
EURASIP JOURNAL ON EMBEDDED SYSTEMS, 2006, (01) :1-13
[4]   High-Performance FPGA Implementation of Modular Inversion over F256 for Elliptic Curve Cryptography [J].
Hossain, Md Selim ;
Kong, Yinan .
2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, :169-174
[5]  
Kerry C.F., 2013, PUB1864 FIPS
[6]  
Koblitz N., 1987, MATH COMPUT, V48, P203
[7]  
Koppl Martin, 2021, 2021 2nd International Conference on Electronics, Communications and Information Technology (CECIT), P268, DOI 10.1109/CECIT53797.2021.00054
[8]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426
[9]  
Mrabet A., 2017, 2017 INT C ENG MIS I, P1, DOI [10.1109/ICEMIS.2017.8272995, DOI 10.1109/ICEMIS.2017.8272995]