Programmable implementation of time-area efficient Elliptic Curve Cryptography for entity authentication

被引:3
作者
Arunachalam, Kamaraj [1 ]
Perumalsamy, Marichamy [2 ]
机构
[1] Mepco Schlenk Engn Coll, Dept ECE, Sivakasi, India
[2] PSR Engn Coll, Dept ECE, Sivakasi, India
来源
INFORMACIJE MIDEM-JOURNAL OF MICROELECTRONICS ELECTRONIC COMPONENTS AND MATERIALS | 2022年 / 52卷 / 02期
关键词
Urdhva Tiryagbhyam; Pipeline; Remote Keyless system Authentication; FPGA; REMOTE USER AUTHENTICATION; FPGA IMPLEMENTATION; POINT MULTIPLICATION; PROCESSOR; CRYPTOSYSTEM; LIGHTWEIGHT; SCHEME; DESIGN;
D O I
10.33180/InfMIDEM2022.203
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The rise of wireless technologies, communications and devices, has resulted in the demand for effective security with low hardware requirements and high speed. Among the various cryptographic algorithms, the Elliptic Curve Cryptography (ECC) provides an attractive solution for this demand. In this paper, the Remote Keyless system (RKE) Authentication process using the ECC is implemented in Field Programmable Gate Array (FPGA). The designed ECC processor supports 256-bit point multiplication and point addition on the Koblitz curve secp256k1. The scalar multiplication is performed with the faster multiplier Urdhva Tiryagbhyam (UT). Additionally, pipelining is incorporated in order to speed up the multiplication process of the processor. The proposed ECC processor performs single point multiplication of 256-bit in 1.2062ms with a maximum clock frequency of 192.5MHz, which provides 212.23kbps throughput and occupies 8.23k slices in Virtex-7 FPGA. Incorporating a pipeline in scalar multiplication improves the maximum clock frequency up to 15.12%, which reduces time consumption by 22.36%, which in turn increases the throughput by 22.36%. The proposed pipelined Vedic multiplier based ECC processor outperforms the existing designs in terms of area, operating frequency, area-delay product and throughput. Also, the security evaluation and analysis of the proposed ECC processor are performed, which ensures the safety of RKE systems. Hence, the implementation of the proposed method offers time-area-efficient and fast scalar multiplication with effective hardware utilization without any compromise in security level.
引用
收藏
页码:89 / 103
页数:15
相关论文
共 50 条
  • [1] Ahuja Prashant, 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), P1706, DOI 10.1109/ICECA.2018.8474569
  • [2] Amara Moncef, 2011, 2011 7th International Workshop on Systems, Signal Processing and their Applications (WOSSPA 2011), P247, DOI 10.1109/WOSSPA.2011.5931464
  • [3] A robust and anonymous patient monitoring system using wireless medical sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 483 - 495
  • [4] High-throughput multi-key elliptic curve cryptosystem based on residue number system
    Asif, Shahzad
    Hossain, Md Selim
    Kong, Yinan
    [J]. IET COMPUTERS AND DIGITAL TECHNIQUES, 2017, 11 (05) : 165 - 172
  • [5] An Efficient Two-Factor Remote User Authentication and Session Key Agreement Scheme Using Rabin Cryptosystem
    Chandrakar, Preeti
    Om, Hari
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2018, 43 (02) : 661 - 673
  • [6] Francillon A., 2011, P NETWORK DISTRIBUTE
  • [7] Glocker T, 2017, INT CONF INFORM COMM, P310, DOI 10.1109/IACS.2017.7921990
  • [8] Gowthami P., 2018, ARPN J ENG APPL SCI, V13, P1002
  • [9] Hankerson D., 2006, GUIDE ELLIPTIC CURVE
  • [10] Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
    He, Debiao
    Wang, Ding
    Wu, Shuhua
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (02): : 170 - 177