Abstract

This paper presents a Point Multiplication (PM) architecture of Elliptic-Curve Cryptography (ECC) over GF(2163) with a focus on the optimization of hardware resources and latency at the same time. The hardware resources are reduced with the use of a bit-serial (traditional schoolbook) multiplication method. Similarly, the latency is optimized with the reduction in a critical path using pipeline registers. To cope with the pipelining, we propose to reschedule point addition and double instructions, required for the computation of a PM operation in ECC. Subsequently, the proposed architecture over GF(2163) is modeled in Verilog Hardware Description Language (HDL) using Vivado Design Suite. To provide a fair performance evaluation, we synthesize our design on various FPGA (field-programmable gate array) devices. These FPGA devices are Virtex-4, Virtex-5, Virtex-6, Virtex-7, Spartan-7, Artix-7, and Kintex-7. The lowest area (433 FPGA slices) is achieved on Spartan-7. The highest speed is realized on Virtex-7, where our design achieves 391 MHz clock frequency and requires 416 μs for one PM computation (latency). For power, the lowest values are achieved on the Artix-7 (56 μW) and Kintex-7 (61 μW) devices. A ratio of throughput over area value of 4.89 is reached for Virtex-7. Our design outperforms most recent state-of-the-art solutions (in terms of area) with an overhead of latency.

Highlights

  • The exponential growth of information technology have resulted in various applications for the betterment of society

  • It is important to note that the architectures of our selected devices contain four-input Lookup Tables (LUTs) for Virtex-4 and six-input

  • The comparison in terms of clock frequency reveals that the proposed design is 1.05 times faster compared with the solution in [22]

Read more

Summary

Introduction

The exponential growth of information technology have resulted in various applications for the betterment of society. Cryptography is one technique that is frequently employed to maintain data privacy [2] It has two types, i.e., symmetric and asymmetric ( termed a public key). There are several applications that demand either software or hardware implementations of ECC. The applications of ECC that require an hardware implementation focus on the speed-up of critical operations. The finite field arithmetic (layer one) operations, i.e., multiplication, addition, inversion, and squaring, are required to compute PA and PD. Apart from these four layers, ECC involves two bases for the elliptic-curve points (i.e., initial, intermediate, and final) representation, i.e., polynomial and normal. We selected a projective coordinate system as it requires minimal inversion operations

State-of-the-Art PM Architectures
Contributions
Background for PM Computation
Proposed PM Architecture
Register File
Pipelined Registers and Proposed Scheduling of PA and PD Operations
Routing Multiplexers
Control Block
Results and Comparisons
Implementation Results
Comparison with Existing PM Solutions
Possible Leakages and Countermeasures
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call