Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications
نویسندگان
چکیده
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces which devices exposed. Elliptic Curve Cryptography (ECC) largely adopted in an context provide services such as key-exchange digital signature. For applications, hardware acceleration ECC-based algorithms can be mandatory meet low-latency low-power/energy requirements. In this paper, we propose fast configurable accelerator NIST P-256/-521 elliptic curves, developed European Processor Initiative. The proposed architecture supports most used cryptography schemes based on ECC Digital Signature Algorithm (ECDSA), Integrated Encryption Scheme (ECIES), Diffie-Hellman (ECDH) Menezes-Qu-Vanstone (ECMQV). A modified version Double-And-Add-Always algorithm Point Multiplication has been proposed, allows execution Addition Doubling operations concurrently implements countermeasures against power timing attacks. simulated approach extract traces assess effectiveness compared classical Multiplication. constant-time Shamir’s Trick speed-up Double-Point modular inversion executed using Fermat’s Little Theorem, reusing internal multipliers. verified Xilinx ZCU106 development board synthesized both 45 nm 7 Standard-Cell technologies.
منابع مشابه
Elliptic Curve Crypto-processor
In this paper, we propose an elliptic curve key generation processor over GF(2 163 ) scheme based on the Montgomery scalar multiplication algorithm. The new architecture is performed using polynomial basis. The Finite Field operations use a cellular automata multiplier and Fermat algorithm for inversion. For real time implementation, the architecture has been tested on an ISE 9.1 Software using...
متن کاملVLSI core architecture for GF(p) elliptic curve crypto processor
A novel GF(p) crypto processor core architecture is presented in this paper. The core is used to implement GF(p) Elliptic Curve Cryptosystem (ECC). The architecture is such that a single core can be used to implement ECC or alternatively a two core solution can be adopted. As a result, the core architecture allows the exploitation of the parallelism that exists in elliptic curve point addition ...
متن کاملA power-optimized low-energy elliptic-curve crypto-processor
This paper presents a low-energy prime-field elliptic-curve cryptography (ECC) hardware processor, suitable for low-power and/or energy-efficient applications and systems. The ECC processor is obtained by power-optimizing a previously reported design. The optimization is performed by making the power consumption profile of the processor as uniform as possible, in an attempt to increase the seco...
متن کاملCompact and Scalable Elliptic Curve Crypto Processor in Binary Field
Elliptic Curve Cryptography plays a vital role in securing the information for the past two decades. Implementing ECC in hardware is more efficient than software. A processor is said to be compact, if its implementation space is small compared to its execution speed and is scalable if this processor is used with different key sizes. Different metrics such as execution time, implementation space...
متن کاملA low power asynchronous GF(2/sup 173/) ALU for elliptic curve crypto-processor
Elliptic Curve Cryptography is becoming popular in recent decades due to its highest security strength per hit, less memory resources and low processing. power which makes it attractive to apply in energy constraints applications such as contact-less smartcard. In this paper, a 173-bit (m = 173) Type I1 Optimal Normal Basis (ONBII) representation is chosen in the implementation of the Galois Fi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energies
سال: 2021
ISSN: ['1996-1073']
DOI: https://doi.org/10.3390/en14154676