High-Performance Implementation of SM2 Based on FPGA

被引:0
作者
Zhang, Dan [1 ]
Bai, Guoqiang [2 ]
机构
[1] Tsinghua Univ, Dept Microelect, Beijing, Peoples R China
[2] Tsinghua Univ, Dept Microelect, Natl Lab Informat Sci & Technol, Beijing, Peoples R China
来源
PROCEEDINGS OF 2016 8TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2016) | 2016年
关键词
ECC; SM2; SPA; FPGA; pseudo-Mersenne;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This brief presents an FPGA-based ultra-high performance ECC implementation over SM2 prime field which can resist SPA. This processor is designed with bottom-up optimization focused on SM2 and make the best of advantages of modern FPGA. To counteract SPA more efficiently and reduce time cost, traditional MPL algorithm is modified to be the main algorithm which can execute point addition (PA) and point double (PD) in parallel. Then PA and PD are designed to be full-isochronous modules invoked by main algorithm to maximize the efficiency. Finite field operations adopt DSP blocks to increase frequency. Spliced multipliers are matched with same-frequency adders in the introduced pipeline structure, which improve hardware utilization to more than 95 percent. Run on Altera StratixII EP2S30F672 FPGA, this SM2 processor whose frequency reaches 62.3 MHz can be performed at a rate of about 1.3k point multiplications per second, and it only costs 8 DSPs and 4742 ALMs. Compared with other related works, our architecture offers not only ultra-high performance but also deep research about the FPGA-based implementation of SM2.
引用
收藏
页码:718 / 722
页数:5
相关论文
共 11 条
[1]   Flexible Hardware Processor for Elliptic Curve Cryptography Over NIST Prime Fields [J].
Ananyi, Kendall ;
Alrimeih, Hamad ;
Rakhmatov, Daler .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2009, 17 (08) :1099-1112
[2]  
[Anonymous], ADV CRYPTOLOGY CRYPT
[3]  
Brier E., 2002, Public Key Cryptography. 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002. Proceedings (Lecture Notes in Computer Science Vol.2274), P335
[4]  
Guillermin N, 2010, LECT NOTES COMPUT SC, V6225, P48, DOI 10.1007/978-3-642-15031-9_4
[5]  
Institute of Electrical and NY Electronic Engineers, 2010, P1363 STAND SPEC PUB
[6]  
Kolbitz N., 1987, MATH COMPUT, V48, P203
[7]  
McIvor Ciaran J, 2000, CIRCUITS SYSTEMS 1 R, V53, P1946
[8]  
MONTGOMERY PL, 1987, MATH COMPUT, V48, P243, DOI 10.1090/S0025-5718-1987-0866113-7
[9]  
State Cryptography Administration of China, 2010, PUBL KEY CRYPT ALG S
[10]  
WashingtonDC American National Standards Institute, 1999, X 9 62 PUBL KEY CRYP