New Hardware Architectures for Montgomery Modular Multiplication Algorithm

被引:69
作者
Huang, Miaoqing [1 ]
Gaj, Kris [2 ]
El-Ghazawi, Tarek [3 ]
机构
[1] 1 Univ Arkansas, Dept Comp Sci & Comp Engn, Fayetteville, AR 72701 USA
[2] George Mason Univ, Dept Elect & Comp Engn, Fairfax, VA 22030 USA
[3] George Washington Univ, Dept Elect & Comp Engn, Washington, DC 20052 USA
关键词
Montgomery multiplication; MWR2MM algorithm; hardware optimization; field-programmable gate arrays;
D O I
10.1109/TC.2010.247
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Montgomery modular multiplication is one of the fundamental operations used in cryptographic algorithms, such as RSA and Elliptic Curve Cryptosystems. At CHES 1999, Tenca and Koc proposed the Multiple-Word Radix-2 Montgomery Multiplication (MWR2MM) algorithm and introduced a now-classic architecture for implementing Montgomery multiplication in hardware. With parameters optimized for minimum latency, this architecture performs a single Montgomery multiplication in approximately 2n clock cycles, where n is the size of operands in bits. In this paper, we propose two new hardware architectures that are able to perform the same operation in approximately n clock cycles with almost the same clock period. These two architectures are based on precomputing partial results using two possible assumptions regarding the most significant bit of the previous word. These two architectures outperform the original architecture of Tenca and Koc, in terms of the product latency times area by 23 and 50 percent, respectively, for several most common operand sizes used in cryptography. The architecture in radix-2 can be extended to the case of radix-4, while preserving a factor of two speedup over the corresponding radix-4 design by Tenca, Todorov, and Koc from CHES 2001. Our optimization has been verified by modeling it using Verilog-HDL, implementing it on Xilinx Virtex-II 6000 FPGA, and experimentally testing it using SRC-6 reconfigurable computer.
引用
收藏
页码:923 / 936
页数:14
相关论文
共 16 条
  • [1] BATINA L, 2002, P CRYPT TRACK RSA C, P40
  • [2] GAJ K, 2006, P 8 INT WORKSH CRYPT, P119
  • [3] An improved unifled scalable radix-2 Montgomery multiplier
    Harris, D
    Krishnamurthy, R
    Anders, M
    Mathew, S
    Hsu, S
    [J]. 17TH IEEE SYMPOSIUM ON COMPUTER ARITHMETIC, PROCEEDINGS, 2005, : 172 - 178
  • [4] Jiang N, 2007, VLSI-SOC 2007: PROCEEDINGS OF THE 2007 IFIP WG 10.5 INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, P146
  • [5] Kelley K, 2005, 2005 39TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1 AND 2, P1196
  • [6] Analyzing and comparing Montgomery multiplication algorithms
    Koc, CK
    Acar, T
    Kaliski, BS
    [J]. IEEE MICRO, 1996, 16 (03) : 26 - 33
  • [7] High-radix systolic modular multiplication on reconfigurable hardware
    McIvor, C
    McLoone, M
    McCanny, JV
    [J]. FPT 05: 2005 IEEE INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2005, : 13 - 18
  • [8] Modified Montgomery modular multiplication and RSA exponentiation techniques
    McIvor, C
    McLoone, M
    McCanny, JV
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 2004, 151 (06): : 402 - 408
  • [9] Michalski EA, 2006, I C FIELD PROG LOGIC, P145
  • [10] MONTGOMERY PL, 1985, MATH COMPUT, V44, P519, DOI 10.1090/S0025-5718-1985-0777282-X