FPGA Design of Elliptic Curve Cryptosystem (ECC) for Isomorphic Transformation and EC ElGamal Encryption

被引:7
作者
Amiri, Rami [1 ]
Elkeelany, Omar [2 ]
机构
[1] St Cloud State Univ, Elect & Comp Engn Dept, St Cloud, MN 56304 USA
[2] Tennessee Technol Univ, ECE Dept, Cookeville, TN 38505 USA
关键词
ELGamal; cryptography; isomorphic transformation; Koblitz curve;
D O I
10.1109/LES.2020.3003978
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Attacking or tampering with sensitive data continues to increase risks to economic processes or human activities. These risks are significant key factors to improve the development and implementation of security systems. Therefore, improving cryptography is essentially needed to enhance the security of critical data. For example, elliptic curve cryptography (ECC) over the Galois field GF(2163) is one of the public-key (asymmetric) cryptographic techniques, in which demands mapping a message (163-bit) to a point in the prime subgroup of the elliptic curve. To the best of our knowledge, mapping methods are not yet available on Field-Programmable Gate Arrays (FPGAs). Also, asymmetric encryption schemes often do not consider encrypting/decrypting data packets because of their computation complexity and performance limitations. In this letter, we propose and develop a concurrent reconfigurable cryptosystem to encrypt and decrypt stream of data using ECC on FPGA. First, we present hardware design and implementation to map a plain message on the elliptic curve based on isomorphic transformation, then second, we architect the elliptic curve ElGamal public-key encryption method by using point addition and multiplication on Koblitz elliptic curve on FPGA. Our proposed cryptosystem is synthesized and implemented on Intel Cyclone 10 GX and Xilinx Kintex-7 FPGAs to evaluate throughput, and it achieves 25.73-57.1 Mbps.
引用
收藏
页码:65 / 68
页数:4
相关论文
共 12 条
[1]  
Amiri R., 2013, INT J INF ENG, V4, P1
[2]  
[Anonymous], 2000, STANDARDS EFFICIENT
[3]   High-Performance Implementation of Point Multiplication on Koblitz Curves [J].
Azarderakhsh, Reza ;
Reyhani-Masoleh, Arash .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2013, 60 (01) :41-45
[4]   Evaluation of SPN-Based Lightweight Crypto-Ciphers [J].
Dalmasso, Loic ;
Bruguier, Florent ;
Benoit, Pascal ;
Torres, Lionel .
IEEE ACCESS, 2019, 7 :10559-10567
[5]   High-speed hardware implementations of Elliptic Curve Cryptography: A survey [J].
de Dormale, Guerric Meurice ;
Quisquater, Jean-Jacques .
JOURNAL OF SYSTEMS ARCHITECTURE, 2007, 53 (2-3) :72-84
[6]  
Deschamps J.P., 2009, Hardware Implementation of Finite-Field Arithmetic
[7]  
Hoffstein J., 2014, INTRO MATH CRYPTOGRA
[8]   Fast point multiplication on Koblitz curves: Parallelization method and implementations [J].
Jarvinen, Kimmo ;
Skytta, Jorma .
MICROPROCESSORS AND MICROSYSTEMS, 2009, 33 (02) :106-116
[9]  
King B., 2009, INT J NETW SECURITY, V8
[10]  
National Institute of Standards and Technology, 2000, REC ELL CURV FED GOV