Abstract

The high performance of an elliptic curve (EC) crypto system depends efficiently on the arithmetic in the underlying finite field. We have to propose and compare three levels of Galois Field <svg style="vertical-align:-2.3205pt;width:58.950001px;" id="M1" height="18.799999" version="1.1" viewBox="0 0 58.950001 18.799999" width="58.950001" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg"> <g transform="matrix(.017,-0,0,-.017,.062,15.85)"><path id="x47" d="M692 302v-28q-45 -6 -54.5 -17t-9.5 -55v-86q0 -62 7 -95q-7 -2 -32 -7.5l-37 -8l-35.5 -7.5t-40.5 -7t-38.5 -4t-40.5 -2q-165 0 -266 93t-101 243q0 84 32 151t86 108t121.5 63t142.5 22q29 0 62.5 -4t52 -7.5t47.5 -10.5t31 -7l15 -156l-28 -6q-17 87 -66.5 121.5&#xA;t-128.5 34.5q-117 0 -191 -80.5t-74 -216.5q0 -56 17 -110t49.5 -100.5t87.5 -74.5t124 -28q53 0 87 17q17 9 24.5 23t7.5 43v85q0 54 -15.5 67.5t-89.5 18.5v28h254z" /></g><g transform="matrix(.017,-0,0,-.017,12.217,15.85)"><path id="x46" d="M493 503l-29 -4q-13 56 -28 80q-13 22 -35.5 29.5t-78.5 7.5h-76q-22 0 -27.5 -5t-5.5 -27v-238h103q66 0 82.5 12t25.5 62h29v-193h-29q-9 54 -25.5 67t-82.5 13h-103v-181q0 -64 15 -78.5t84 -19.5v-28h-272v28q61 5 74.5 19.5t13.5 78.5v399q0 64 -13 78t-72 19v28&#xA;h440q1 -40 10 -147z" /></g><g transform="matrix(.017,-0,0,-.017,21.209,15.85)"><path id="x28" d="M300 -147l-18 -23q-106 71 -159 185.5t-53 254.5v1q0 139 53 252.5t159 186.5l18 -24q-74 -62 -115.5 -173.5t-41.5 -242.5q0 -130 41.5 -242.5t115.5 -174.5z" /></g><g transform="matrix(.017,-0,0,-.017,27.091,15.85)"><path id="x32" d="M412 140l28 -9q0 -2 -35 -131h-373v23q112 112 161 170q59 70 92 127t33 115q0 63 -31 98t-86 35q-75 0 -137 -93l-22 20l57 81q55 59 135 59q69 0 118.5 -46.5t49.5 -122.5q0 -62 -29.5 -114t-102.5 -130l-141 -149h186q42 0 58.5 10.5t38.5 56.5z" /></g> <g transform="matrix(.012,-0,0,-.012,35.25,7.688)"><path id="x31" d="M384 0h-275v27q67 5 81.5 18.5t14.5 68.5v385q0 38 -7.5 47.5t-40.5 10.5l-48 2v24q85 15 178 52v-521q0 -55 14.5 -68.5t82.5 -18.5v-27z" /></g><g transform="matrix(.012,-0,0,-.012,40.961,7.688)"><path id="x36" d="M137 343l67 33q37 17 63 17q79 0 129.5 -53t50.5 -131q0 -92 -58 -156.5t-147 -64.5t-147 68t-58 182q0 63 17 119t43 95.5t61.5 72t69 52t67.5 31.5q62 22 128 33l6 -32q-56 -11 -108 -35q-149 -71 -184 -231zM227 337q-47 0 -95 -27q-6 -23 -6 -70q0 -93 36 -155.5&#xA;t96 -62.5q53 0 78 45.5t25 105.5q0 68 -35 116t-99 48z" /></g><g transform="matrix(.012,-0,0,-.012,46.673,7.688)"><path id="x33" d="M285 378v-2q65 -13 102 -54.5t37 -97.5q0 -57 -30.5 -104.5t-74 -75t-85.5 -42t-72 -14.5q-31 0 -59.5 11t-40.5 23q-19 18 -16 36q1 16 23 33q13 10 24 0q58 -51 124 -51q55 0 88 40t33 112q0 64 -39 96.5t-88 32.5q-29 0 -64 -11l-6 29q77 25 118 57.5t41 84.5&#xA;q0 45 -26.5 69.5t-68.5 24.5q-67 0 -120 -79l-20 20l43 63q51 56 127 56h1q66 0 107 -37t41 -95q0 -42 -31 -71q-22 -23 -68 -54z" /></g> <g transform="matrix(.017,-0,0,-.017,53.012,15.85)"><path id="x29" d="M275 270q0 -296 -211 -440l-19 23q75 62 116.5 174t41.5 243t-42 243t-116 173l19 24q211 -144 211 -440z" /></g> </svg>, <svg style="vertical-align:-2.3205pt;width:58.950001px;" id="M2" height="18.725" version="1.1" viewBox="0 0 58.950001 18.725" width="58.950001" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg"> <g transform="matrix(.017,-0,0,-.017,.062,15.775)"><use xlink:href="#x47"/></g><g transform="matrix(.017,-0,0,-.017,12.217,15.775)"><use xlink:href="#x46"/></g><g transform="matrix(.017,-0,0,-.017,21.209,15.775)"><use xlink:href="#x28"/></g><g transform="matrix(.017,-0,0,-.017,27.091,15.775)"><use xlink:href="#x32"/></g> <g transform="matrix(.012,-0,0,-.012,35.25,7.613)"><use xlink:href="#x31"/></g><g transform="matrix(.012,-0,0,-.012,40.961,7.613)"><path id="x39" d="M244 635q90 0 143 -72t53 -177q0 -133 -65 -229.5t-171 -139.5q-79 -32 -140 -32l-5 30q109 18 185 91t101 186l-68 -36q-29 -16 -60 -16q-79 0 -129 51.5t-50 130.5q0 80 57 146.5t149 66.5zM228 602q-52 0 -78 -45.5t-26 -98.5q0 -69 36.5 -115.5t97.5 -46.5&#xA;q53 0 90 28q4 31 4 66q0 51 -9.5 95.5t-39 80.5t-75.5 36z" /></g><g transform="matrix(.012,-0,0,-.012,46.673,7.613)"><use xlink:href="#x33"/></g> <g transform="matrix(.017,-0,0,-.017,53.012,15.775)"><use xlink:href="#x29"/></g> </svg>, and <svg style="vertical-align:-2.3205pt;width:58.950001px;" id="M3" height="18.799999" version="1.1" viewBox="0 0 58.950001 18.799999" width="58.950001" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg"> <g transform="matrix(.017,-0,0,-.017,.062,15.85)"><use xlink:href="#x47"/></g><g transform="matrix(.017,-0,0,-.017,12.217,15.85)"><use xlink:href="#x46"/></g><g transform="matrix(.017,-0,0,-.017,21.209,15.85)"><use xlink:href="#x28"/></g><g transform="matrix(.017,-0,0,-.017,27.091,15.85)"><use xlink:href="#x32"/></g> <g transform="matrix(.012,-0,0,-.012,35.25,7.688)"><use xlink:href="#x32"/></g><g transform="matrix(.012,-0,0,-.012,40.961,7.688)"><path id="x35" d="M153 550l-26 -186q79 31 111 31q90 0 141.5 -51t51.5 -119q0 -93 -89 -166q-85 -69 -173 -71q-32 0 -61.5 11.5t-41.5 23.5q-18 17 -17 34q2 16 22 33q14 9 26 -1q61 -50 124 -50q60 0 93 43.5t33 104.5q0 69 -41.5 110t-121.5 41q-53 0 -102 -20l38 305h286l6 -8&#xA;l-26 -65h-233z" /></g><g transform="matrix(.012,-0,0,-.012,46.673,7.688)"><use xlink:href="#x36"/></g> <g transform="matrix(.017,-0,0,-.017,53.012,15.85)"><use xlink:href="#x29"/></g> </svg>. The proposed architecture is based on Lopez-Dahab elliptic curve point multiplication algorithm, which uses Gaussian normal basis for <svg style="vertical-align:-2.3205pt;width:58.950001px;" id="M4" height="18.799999" version="1.1" viewBox="0 0 58.950001 18.799999" width="58.950001" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg"> <g transform="matrix(.017,-0,0,-.017,.062,15.85)"><use xlink:href="#x47"/></g><g transform="matrix(.017,-0,0,-.017,12.217,15.85)"><use xlink:href="#x46"/></g><g transform="matrix(.017,-0,0,-.017,21.209,15.85)"><use xlink:href="#x28"/></g><g transform="matrix(.017,-0,0,-.017,27.091,15.85)"><use xlink:href="#x32"/></g> <g transform="matrix(.012,-0,0,-.012,35.25,7.688)"><use xlink:href="#x31"/></g><g transform="matrix(.012,-0,0,-.012,40.961,7.688)"><use xlink:href="#x36"/></g><g transform="matrix(.012,-0,0,-.012,46.673,7.688)"><use xlink:href="#x33"/></g> <g transform="matrix(.017,-0,0,-.017,53.012,15.85)"><use xlink:href="#x29"/></g> </svg> field arithmetic. The proposed <svg style="vertical-align:-2.3205pt;width:58.950001px;" id="M5" height="18.725" version="1.1" viewBox="0 0 58.950001 18.725" width="58.950001" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg"> <g transform="matrix(.017,-0,0,-.017,.062,15.775)"><use xlink:href="#x47"/></g><g transform="matrix(.017,-0,0,-.017,12.217,15.775)"><use xlink:href="#x46"/></g><g transform="matrix(.017,-0,0,-.017,21.209,15.775)"><use xlink:href="#x28"/></g><g transform="matrix(.017,-0,0,-.017,27.091,15.775)"><use xlink:href="#x32"/></g> <g transform="matrix(.012,-0,0,-.012,35.25,7.613)"><use xlink:href="#x31"/></g><g transform="matrix(.012,-0,0,-.012,40.961,7.613)"><use xlink:href="#x39"/></g><g transform="matrix(.012,-0,0,-.012,46.673,7.613)"><use xlink:href="#x33"/></g> <g transform="matrix(.017,-0,0,-.017,53.012,15.775)"><use xlink:href="#x29"/></g> </svg> is based on an efficient Montgomery add and double algorithm, also the Karatsuba-Ofman multiplier and Itoh-Tsujii algorithm are used as the inverse component. The hardware design is based on optimized finite state machine (FSM), with a single cycle 193 bits multiplier, field adder, and field squarer. The another proposed architecture <svg style="vertical-align:-2.3205pt;width:58.950001px;" id="M6" height="18.799999" version="1.1" viewBox="0 0 58.950001 18.799999" width="58.950001" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg"> <g transform="matrix(.017,-0,0,-.017,.062,15.85)"><use xlink:href="#x47"/></g><g transform="matrix(.017,-0,0,-.017,12.217,15.85)"><use xlink:href="#x46"/></g><g transform="matrix(.017,-0,0,-.017,21.209,15.85)"><use xlink:href="#x28"/></g><g transform="matrix(.017,-0,0,-.017,27.091,15.85)"><use xlink:href="#x32"/></g> <g transform="matrix(.012,-0,0,-.012,35.25,7.688)"><use xlink:href="#x32"/></g><g transform="matrix(.012,-0,0,-.012,40.961,7.688)"><use xlink:href="#x35"/></g><g transform="matrix(.012,-0,0,-.012,46.673,7.688)"><use xlink:href="#x36"/></g> <g transform="matrix(.017,-0,0,-.017,53.012,15.85)"><use xlink:href="#x29"/></g> </svg> is based on applications for which compactness is more important than speed. The FPGA&#x2019;s dedicated multipliers and carry-chain logic are used to obtain the small data path. The different optimization at the hardware level improves the acceleration of the ECC scalar multiplication, increases frequency and the speed of operation such as key generation, encryption, and decryption. Finally, we have to implement our design using Xilinx XC4VLX200 FPGA device.

Highlights

  • Many hardware designs of elliptic curve cryptography have been developed, aiming to accelerate the scalar multiplication processes, mainly those based on the field programmable gate arrays (FPGAs)

  • The main contribution of the present research concerned three major points: an optimal finite state machine (FSM) controlling the whole components, minimizing empty cycles; optimization of the inversion process, by reducing the number of different squaring from 192 to 21, leading to an inversion; separation of the data path routing from the control part, in order to modify only the multiplier, the squarer, the adder and the modulo components

  • We have presented the design of a fast version of elliptic curve (EC) cryptohardware based on a Finite State Machine

Read more

Summary

Introduction

Many hardware designs of elliptic curve cryptography have been developed, aiming to accelerate the scalar multiplication processes, mainly those based on the field programmable gate arrays (FPGAs). More and more FPGA implementations are in an environment which used to be ASIC-only territory. When these applications are implemented on an FPGA, they need secure data communication. In this rapidly changing environment, the reconfigurability of an FPGA is a very useful feature which is not available on an ASIC. It is the ability to embed a strategic and strong algorithm in very few hardware, that is, finding an optimal solution to the one to many problem: portability against power consumption, speed against area, but the main issue in cryptography is security

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call