Elliptic Curve Cryptography with Efficiently Computable Endomorphisms and Its Hardware Implementations for the Internet of Things

被引:43
作者
Liu, Zhe [1 ,2 ,3 ]
Grossschadl, Johann [4 ]
Hu, Zhi [5 ]
Jarvinen, Kimmo [6 ,7 ,8 ]
Wang, Husen [4 ]
Verbauwhede, Ingrid [6 ,7 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Jiangsu, Peoples R China
[2] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[3] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON N2L 3G1, Canada
[4] Univ Luxembourg, L-4365 Esch Sur Alzette, Luxembourg
[5] Cent S Univ, Sch Math & Stat, Changsha 410083, Hunan, Peoples R China
[6] Katholieke Univ Leuven, ESAT COSIC, B-3000 Leuven, Belgium
[7] Katholieke Univ Leuven, iMinds, B-3000 Leuven, Belgium
[8] Aalto Univ, Dept Comp Sci, Aalto 00076, Finland
关键词
VLSI designs; Internet-of-Things; signature verification; elliptic curve cryptography; multiple-precision arithmetic; MONTGOMERY INVERSE; PROCESSOR;
D O I
10.1109/TC.2016.2623609
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Verification of an ECDSA signature requires a double scalar multiplication on an elliptic curve. In this work, we study the computation of this operation on a twisted Edwards curve with an efficiently computable endomorphism, which allows reducing the number of point doublings by approximately 50 percent compared to a conventional implementation. In particular, we focus on a curve defined over the 207-bit prime field F-p with p = 2(207) - 5,131. We develop several optimizations to the operation and we describe two hardware architectures for computing the operation. The first architecture is a small processor implemented in 0.13 mu m CMOS ASIC and is useful in resource-constrained devices for the Internet of Things (IoT) applications. The second architecture is designed for fast signature verifications by using FPGA acceleration and can be used in the server-side of these applications. Our designs offer various trade-offs and optimizations between performance and resource requirements and they are valuable for IoT applications.
引用
收藏
页码:773 / 785
页数:13
相关论文
共 40 条
[1]  
[Anonymous], 1989, A Wiley-Interscience Publication
[2]  
[Anonymous], 4492 RFC INT ENG TAS
[3]  
[Anonymous], 2008, 5246 RFC
[4]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[5]  
Bernstein DJ, 2008, LECT NOTES COMPUT SC, V5023, P389
[6]  
Bernstein DJ, 2006, LECT NOTES COMPUT SC, V3958, P207
[7]   High-speed high-security signatures [J].
Bernstein, Daniel J. ;
Duif, Niels ;
Lange, Tanja ;
Schwabe, Peter ;
Yang, Bo-Yin .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (02) :77-89
[8]   A high-performance elliptic curve cryptographic processor for general curves over GF(p) based on a systolic arithmetic unit [J].
Chen, Gang ;
Bai, Guoqiang ;
Chen, Hongyi .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2007, 54 (05) :412-416
[9]   EXPONENTIATION CRYPTOSYSTEMS ON THE IBM PC [J].
COMBA, PG .
IBM SYSTEMS JOURNAL, 1990, 29 (04) :526-538
[10]  
Digital Signature Standard (DSS), 2013, NIST FIPS PUBL, V186-4