An Efficient Hardware Design of Prime Field Modular Inversion/Division for Public Key Cryptography

被引:1
作者
Guo, Kai-Yuan [1 ]
Fang, Wai-Chi [1 ]
Fahier, Nicolas [1 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Inst Elect, Hsinchu 30010, Taiwan
来源
2023 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS | 2023年
关键词
Cryptosystem; Public key cryptography; Elliptic curve digital signature algorithm; Elliptic curve cryptography; Modular inversion; Modular division; Binary inversion algorithm;
D O I
10.1109/ISCAS46773.2023.10181906
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we proposed an area-efficient hardware implementation of modular inversion/division, which is a complex and crucial component in elliptic curve cryptography (ECC). Our modular inversion/division is based on our modified binary inversion algorithm. The proposed hardware implementation of modular inversion/division improves the area efficiency and was designed and implemented on Xilinx Spartan-6 and Virtex-7 field-programmable gate array (FPGA) platforms and simulated with TSMC 90nm and 180nm technology nodes. Our proposed modular inversion/division is suitable for prime fields used in public key cryptography, including the NIST-recommended elliptic curves. It occupies 618 slices and 607 slices in Xilinx Spartan-6 and Virtex-7 FPGA platform, computes in 10.6 mu s and 6.45 over the prime filed P-256, at a maximum operating frequency of 33.76 MHz and 55.49 MHz. It occupies 23997 GE and 28471 GE, computes in 1.25 mu s and 2.43 mu s over the prime fields P-256 at a maximum operating frequency of 285.71 MHz and 147.06 MHZ, respectively for TSMC 90nm and 180nm technology node implementation.
引用
收藏
页数:5
相关论文
共 36 条
[21]   Public-Key Cryptography in Blockchain: Design, Analysis, Assessment and Prospect [J].
Huang K. ;
Li X. ;
Yuan S. ;
Liu X.-Y. ;
Zhang X.-S. .
Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03) :491-525
[22]   Review of Modular Multiplication Algorithms over Prime Fields for Public-Key Cryptosystems [J].
Huang, Hai ;
Zheng, Jiwen ;
Chen, Zhengyu ;
Zhao, Shilei ;
Wu, Hongwei ;
Yu, Bin ;
Liu, Zhiwei .
CRYPTOGRAPHY, 2025, 9 (02)
[23]   Secure and Energy Efficient Design of Multi-Modular Exponential Techniques for Public-Key Cryptosystem [J].
Tiwari U. ;
Vollala S. ;
Ramasubramanian N. ;
Begum B.S. ;
Lakshminarayanan G. .
Journal of Communications and Information Networks, 2022, 7 (03) :309-323
[24]   Teaching HW/SW Co-Design With a Public Key Cryptography Application [J].
Uhsadel, Leif ;
Ullrich, Markus ;
Das, Amitabh ;
Karaklajic, Dusko ;
Balasch, Josep ;
Verbauwhede, Ingrid ;
Dehaene, Wim .
IEEE TRANSACTIONS ON EDUCATION, 2013, 56 (04) :478-483
[25]   Robust finite field arithmetic for fault-tolerant public-key cryptography [J].
Gaubatz, Gunnar ;
Sunar, Berk .
FAULT DIAGNOISIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2006, 4236 :196-210
[26]   An area-efficient design for modular inversion in GF(2m) [J].
Wang, Jian ;
Jiang, Anping .
2006 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, 2006, :1496-+
[27]   Efficient and flexible co-processor for server-based public key cryptography applications [J].
Laue R. .
Lecture Notes in Electrical Engineering, 2010, 78 :129-149
[28]   Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations [J].
Wenger, Erich ;
Hutter, Michael .
INFORMATION SECURITY TECHNOLOGY FOR APPLICATIONS, 2012, 7161 :256-271
[29]   A Deterministic Polynomial Public Key Algorithm over a Prime Galois Field GF(p) [J].
Kuang, Randy .
2021 2ND ASIA CONFERENCE ON COMPUTERS AND COMMUNICATIONS (ACCC 2021), 2021, :79-88
[30]   Key Generation Using Generalized Pell's Equation in Public Key Cryptography Based on the Prime Fake Modulus Principle to Image Encryption and Its Security Analysis [J].
Raghunandan, K. R. ;
Ganesh, Aithal ;
Surendra, Shetty ;
Bhavya, K. .
CYBERNETICS AND INFORMATION TECHNOLOGIES, 2020, 20 (03) :86-101