Efficient Architectures for Elliptic Curve Cryptography Processors for RFID

被引:2
作者
Leinweber, Lawrence [1 ]
Papachristou, Christos [1 ]
Wolff, Francis G. [1 ]
机构
[1] Case Western Reserve Univ, Cleveland, OH 44106 USA
来源
2009 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN | 2009年
关键词
Elliptic Curve Cryptography; RFID; security;
D O I
10.1109/ICCD.2009.5413128
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
RFID tags will supplant barcodes for product identification in the supply chain. The capability of a tag to be read without a line of sight is its principal benefit, but compromises the privacy of the tag owner. Public key cryptography can restore this privacy. Because of the extreme economic constraints of the application, die area and power consumption for cryptographic functions must be minimized. Elliptic curve processors efficiently provide the cryptographic capability needed for RFID. This paper proposes efficient architectures for elliptic curve processors in GF(2(m)). One design requires six m-bit registers and six Galois field multiply operations per key bit. The other design requires five m-bit registers and seven Galois field multiply operations per key bit. These processors require a small number of circuit elements and clock cycles while providing protection from simple side-channel attacks. Synthesis results are presented for power, area, and delay in 250, 130 and 90 nm technologies. Compared with prior designs from the literature, the proposed processors require less area and energy. For the B-163 curve, with bit-serial multiplier, the first proposed design synthesized in an IBM low-power 130 nm technology requires an area of 9613 gate equivalents, 163,355 cycles and 4.14 mu J for an elliptic curve point multiplication. The other proposed design requires 8756 gate equivalents, 190,570 cycles and 4.19 mu J.
引用
收藏
页码:372 / 377
页数:6
相关论文
共 21 条
[1]  
[Anonymous], 1999, REC ELL CURV FED GOV
[2]  
Avanzi R., 2005, HDB ELLIPTIC HYPEREL
[3]  
BATINA L, 2006, LNCS, V4357
[4]  
BATINA L, 2007, IEEE INT WORKSH PERV
[5]  
Batina L., 2006, INFORM SOC TECHNOLOG
[6]  
Blake I.F., 1999, ELLIPTIC CURVES CRYP
[7]  
Finkenzeller K., 2003, RFID HDB FUNDAMENTAL, V2nd ed.
[8]  
Fournaris A.P., 2007, WIRELESS SECURITY CR
[9]  
Garfinkel S., 2005, RFID APPL SECURITY P
[10]  
Huang C., 2003, INT C ASIC