High-Performance FPGA Implementation of Modular Inversion over F256 for Elliptic Curve Cryptography

被引:12
作者
Hossain, Md Selim [1 ]
Kong, Yinan [1 ]
机构
[1] Macquarie Univ, Dept Engn, Sydney, NSW 2109, Australia
来源
2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS | 2015年
关键词
Elliptic curve cryptography (ECC); modular inversion (MI); field-programmable gate-array (FPGA); public-key cryptography (PKC); NIST (National Institute of Standards and Technology) prime field;
D O I
10.1109/DSDIS.2015.47
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modular Inversion over a prime field is an important operation for public-key cryptographic applications. It is the most crucial operation to speed up the calculation of an elliptic curve crypto-processor (ECC) when affine coordinates are used. In this work, the main goal is to implement a fast, high-performance modular inversion for ECC using field-programmable gate-array (FPGA) technology. A binary inversion algorithm in VHDL has been used for this efficient implementation. Timing simulation shows that the delay for one modular inversion operation in a modern Xilinx Virtex-7 FPGA is only 2.329 mu s at the maximum frequency of 146.389 MHz. We have implemented an area-efficient design which takes a small amount of resources on the FPGA and needs only 1480 slices. To the best of the authors' knowledge, the proposed modular inversion over F-256 provides a better performance than the available hardware implementations in terms of the area and the timing.
引用
收藏
页码:169 / 174
页数:6
相关论文
共 17 条
[11]   Modular multiplication using the core function in the residue number system [J].
Kong, Yinan ;
Asif, Shahzad ;
Khan, Mohammad A. U. .
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2016, 27 (01) :1-16
[12]   Efficient Power-Analysis-Resistant Dual-Field Elliptic Curve Cryptographic Processor Using Heterogeneous Dual-Processing-Element Architecture [J].
Lee, Jen-Wei ;
Chung, Szu-Chi ;
Chang, Hsie-Chia ;
Lee, Chen-Yi .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014, 22 (01) :49-61
[13]   Hardware elliptic curve cryptographic processor over GF(p) [J].
McIvor, Ciaran J. ;
McLoone, Maire ;
McCanny, John V. .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2006, 53 (09) :1946-1957
[14]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426
[15]   Highly parallel modular multiplication in the residue number system using sum of residues reduction [J].
Phillips, Braden J. ;
Kong, Yinan ;
Lim, Zhining .
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2010, 21 (03) :249-255
[16]  
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
[17]  
Vliegen J., 2010, Proceedings of the 21st IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2010), P313, DOI 10.1109/ASAP.2010.5540977