Abstract

The authentication of Internet of Things (IoT) devices based on the Physical Unclonable Function (PUF) is widely adopted in the information security domain. However, the leakage of PUF responses in an authentication system reduces its privacy and security. To improve its security, we can utilize the Elliptic Curve Cryptography (ECC) algorithm with different key lengths to encrypt the PUF response arbitrarily. Point multiplication is the most time-consuming operation in ECC because of its complex calculation process, which seriously affects the efficiency of the PUF response encryption. In order to solve this problem, a point multiplier based on binary field with reconfigurable key lengths of 233, 283, 409 and 571 is designed in this paper. In our method, by reusing the underlying computing units, the resources needed for point multiplication are effectively reduced. What it is more innovative is that double point multiplication operations with a key length of less than 283 bits can be performed simultaneously in the elaborate designed point multiplication circuit, which can effectively speed up the encryption process of ECC. The circuit is implemented on Xilinx Virtex-6 FPGA. The experiment results show the single point multiplication times of 233, 283, 409 and 571 key lengths are 19.33, 22.36, 41.36 and 56.5 μs, respectively, under the clock frequency of 135 MHz. In addition, it only needs 19.33 μs to perform two-point multiplication operations when the key length is 233 bits at the same time. When the key length is 283 bits, the point multiplication operation can be performed twice in 22.36 μs.

Highlights

  • Internet of Things (IoT) devices based on Physical Unclonable Function (PUF) are widely adopted in people’s daily lives, such as intelligent security, smart home and other application scenarios [1,2]

  • Elliptic Curve Cryptography (ECC) is based on the elliptic curve discrete logarithm problem (ECDLP), whose core operation is built upon finite field arithmetic operations

  • In order to meet the needs of encryption for the auxiliary data of fuzzy extractor in the lightweight authentication system based on a PUF IoT device, this paper uses

Read more

Summary

Introduction

IoT devices based on PUF are widely adopted in people’s daily lives, such as intelligent security, smart home and other application scenarios [1,2]. This can effectively protect the PUF response and ensure secure authentication of the IoT device. (b) authentication system for ECC encryption of PUF response. In the application of PUF response encryption, ECC encryption with different key lengths should be selected arbitrarily to increase the computation complexity of the system and improve the security of the system. The existing ECC hardware system can only perform the calculation of a single key length. A reconfigurable ECC system based on FPGA is designed, which can perform the encryption operation by arbitrarily selecting four key lengths to meet the requirements of the PUF response encryption. A field operation module compatible with four key lengths is designed to meet the requirements of system compatibility and improved flexibility of the system.

Related Works
Background
Binary Field Arithmetic Operations
Polynomial Multiplication
Modular Square
Modular Reduction
Modular Inversion
Elliptic Curve Overview
Point Addition
Point Doubling
Coordinate Retransformation
Point Multiplication
PM Module Overview
Modular Square Module
Field Multiplication Module
Point Addition Module
Point Doubling Module
Modular Inversion Module
Coordinate Retransformation Module
Experiment Setup
Results Analysis
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call