High-speed FPGA implementation of full-word Montgomery multiplier for ECC applications

被引:25
作者
Khan, Safiullah [1 ]
Javeed, Khalid [2 ]
Shah, Yasir Ali [1 ]
机构
[1] COMSATS Inst Informat Technol, Elect Engn Dept, Abbottabad 22010, Pakistan
[2] Bahria Univ, Comp Engn Dept, Islamabad 44000, Pakistan
关键词
Montgomery modular multiplication; FPGA; Karatsuba algorithm; MODULAR MULTIPLICATION; ELLIPTIC-CURVES; CRYPTOGRAPHY; GF(P); ALGORITHMS;
D O I
10.1016/j.micpro.2018.07.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Modular multiplication is the most crucial operation in many public-key crypto-systems, which can be accomplished by integer multiplication followed by a reduction scheme. The reduction scheme involves a division operation that is costly in terms of computation time and resource consumption both on hardware and software platforms. Montgomery modular multiplication is widely used to eliminate the costly division operation. This work presents an efficient implementation of full-word Montgomery modular multiplication. This incorporates the more efficient Karatsuba algorithm where the complexity of multiplication is reduced form O(n(2)) to O(n(1.58)). The Karatsuba algorithm recommends to split the operands into smaller chunks. Two methods of operand splitting are exploited: (1) Four Parts (FP) splitting and (2) Deep Four Parts (DFP) splitting. These methods are then used in the design of Integer Multiplier (IM) and Montgomery Multiplier (MM). The design is synthesized using Xilinx ISE 14.1 Design Suite for Virtex-5, Virtex-6 and Virtex-7. Compared with the traditional implementations, the proposed scheme outperforms all other designs in terms of throughput and area-delay product. Moreover, the proposed scheme utilizes the least hardware resources in the known literature. The proposed MM design is able to compute modular multiplication for the Elliptic Curve Cryptography (ECC) field sizes of 192-512 bits.
引用
收藏
页码:91 / 101
页数:11
相关论文
共 30 条
[1]  
Bernstein DJ, 2007, LECT NOTES COMPUT SC, V4833, P29
[2]  
BLAKLEY GR, 1983, IEEE T COMPUT, V32, P497, DOI 10.1109/TC.1983.1676262
[3]  
Brinci R., 2013, IACR CRYPTOL EPRINT, V2013, P5
[4]  
Chow G. C. T., 2010, Proceedings 2010 International Conference on Field Programmable Logic and Applications (FPL 2010), P434, DOI 10.1109/FPL.2010.89
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]  
Ghosh Santosh, 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P141, DOI 10.1007/978-3-642-36334-4_9
[7]  
Hankerson D., 2004, Guide to Elliptic Curve Cryptography, DOI [10.1007/0-387-21846-73, DOI 10.1007/0-387-21846-73]
[8]  
Javeed K, 2014, P 24 INT C FIELD PRO, P1, DOI DOI 10.1109/FPL.2014.6927452
[9]   High performance hardware support for elliptic curve cryptography over general prime field [J].
Javeed, Khalid ;
Wang, Xiaojun ;
Scott, Mike .
MICROPROCESSORS AND MICROSYSTEMS, 2017, 51 :331-342
[10]   Low latency flexible FPGA implementation of point multiplication on elliptic curves over GF(p) [J].
Javeed, Khalid ;
Wang, Xiaojun .
INTERNATIONAL JOURNAL OF CIRCUIT THEORY AND APPLICATIONS, 2017, 45 (02) :214-228