Abstract

Problem statement: A fundamental building block for digital communication is the Public-key cryptography systems. Public-Key Cryptography (PKC) systems can be used to provide secure communications over insecure channels without exchanging a secret key. Implementing Public-Key cryptography systems is a challenge for most application platforms when several factors have to be considered in selecting the implementation platform. Approach: The most popular public-key cryptography systems nowadays are RSA and Elliptic Curve Cryptography (ECC). ECC was considered much more suitable than other public-key algorithms. It used lower power consumption, has higher performance and can be implemented on small areas that can be achieved by using ECC. There is no sub exponential-time algorithm in solving the Elliptic curve discrete logarithm problem. Therefore, it offers smaller key size with equivalent security level compared with the other public key cryptosystems. Finite fields (or Galois fields) is considered as an important mathematical theory. Results: Thus, it plays an important role in cryptography. As a result of their carry free arithmetic property, they are suitable to be used in hardware implementation in ECC. In cryptography the most common finite field used is binary field GF (2m). Conclusion: Our design performs all basic binary polynomial operations in Galois Field (GF) using a microcode structure. It uses a bit-serial and pipeline structure for implementing GF operations. Due to its bit-serial architecture, it has a low gate count and a reduced number of I/O pins.

Highlights

  • CryptosystemsPublic-key cryptography and symmetric-key cryptography are two main categories of cryptography

  • Providing an equivalent level of security with smaller key size is an advantage of Elliptic Curve Cryptography (ECC) compared to Public-key system Integer Factorization Problem (IFP) Discrete Logarithm Problem (DLS) Elliptic Curve

  • Right-to-left shift field multiplication in F2m and Montgomery inversion method. These algorithms are used in our bit-serial hardware architecture to calculate scalar multiplication

Read more

Summary

Introduction

CryptosystemsPublic-key cryptography and symmetric-key cryptography are two main categories of cryptography. The Well-known public-key cryptography algorithms are RSA (Rivest et al, 1978), El-Gamal and Elliptic Curve Cryptography. There are only three problems of public key cryptosystems that are considered to be both secured and effective. Shows these mathematical problems and the cryptosystems that rely on such problems. Providing an equivalent level of security with smaller key size is an advantage of ECC compared to Public-key system Integer Factorization Problem (IFP) Discrete Logarithm Problem (DLS) Elliptic Curve

Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.