Area-Time Efficient Hardware Implementation of Elliptic Curve Cryptosystem
نویسندگان
چکیده
The strength of ECC lies in the hardness of elliptic curve discrete logarithm problem (ECDLP) and the hight level security with significantly smaller keys. Thus, using smaller key sizes is a gain in term of speed, power, bandwidth, and storage. Point multiplication is the most common operation in ECC and the most used method to compute it is Montgomery Algorithm. This paper describes an area-efficient hardware implementation of Elliptic Curve Cryptography (ECC) over GF (2). We used the Montgomery modular multiplication method for low cost implementation. Then, to accelerate the elliptic curve point multiplication, we firstly adopted projective coordinates, and then we reduced the number of multiplication block used, so we have a gain at area occupation and execution time. We detailed our optimized hardware architecture and we prove that it outperform existing ones regarding area, power, and energy consumption. Our hardware implementation, on a Xilinx virtex 5 ML 50 FPGA, used only 9670 Slices achieving maximum frequency of 221 MHz, it computed scalar multiplication in only 2.58 μs. FPGA implementations represent generally the first step to obtain faster ASIC implementations.Further, we implemented our design on an ASIC CMOS 45 nm technology, it uses 0.121 mm of area cell, it runs at a frequency of 990 MHz and consumes 39(mW).
منابع مشابه
A Novel and Efficient Hardware Implementation of Scalar Point Multiplier
A new and highly efficient architecture for elliptic curve scalar point multiplication is presented. To achieve the maximum architectural and timing improvements we have reorganized and reordered the critical path of the Lopez-Dahab scalar point multiplication architecture such that logic structures are implemented in parallel and operations in the critical path are diverted to noncritical path...
متن کاملA Study of Suitability and Effectiveness of Various Implementation Options Of Finite Field Arithmetic on Elliptic Curve Crypto System
389 Abstract—Finite field or Galois field plays an important role in efficient architecture design and implementation of Elliptic curve cryptosystem. A lot of research work is going on in this area since it is suitable for cryptography as well as error correcting codes useful for digital communication, compact disks etc. In this paper we discuss the basic concepts of finite field and its applic...
متن کاملAn FPGA implementation of elliptic curve cryptography for future secure web transaction
Elliptic curve cryptography (ECC) is an alternative to traditional techniques for public key cryptography. It offers smaller key size without sacrificing security level. In a typical elliptic curve cryptosystem, elliptic curve point multiplication is the most computationally expensive component. So it would be more attractive to implement this unit using hardware than using software. In this pa...
متن کاملAn FPGA Implementation of an Elliptic Curve Cryptosystem Coprocessor over Prime Fields
Elliptic curve cryptography (ECC) is an alternative to traditional techniques for public key cryptography. It offers a smaller key size without sacrificing security strength. Previous work found that a hardware implementation of ECC has better performance than the software implementation. Since the performance of a typical elliptic curve cryptosystem is based on the execution time of the encryp...
متن کاملDesign and Implementation of Secure Stream Cipher based on Elliptic Curves on Time Shared Basis
This paper proposes the implementation of a Elliptic Curve (EC) cryptosystem which is aimed to provide secure stream ciphers, hash functions and key exchange in a time shared manner. The design of hardware efficient stream cipher based on elliptic curves proposes the use of point multiplication block on a time sharing basis for providing secure stream ciphers, hash generation and key exchange. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015