Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications

View through CrossRef
This paper proposes a novel hardware design for a compact crypto processor devoted to elliptic-curve point multiplication over GF(2233). We focus on minimizing hardware usage, which we obtain using an iterative bit–serial finite field modular multiplier for polynomial coefficient multiplication. The same multiplier is also used for modular squares and inversion computations, further optimizing the hardware footprint. Our design offers flexibility by permitting users to load different curve parameters and secret keys while keeping a low-area hardware design. To efficiently generate the control signals, we utilize a finite-state-machine-based controller. We have implemented the proposed crypto processor on Virtex-6 and Virtex-7 FPGA devices, and we have evaluated its performance at clock frequencies of 100, 50, and 10 MHz. Specifically, for one point multiplication computation on Virtex-7 FPGA, our crypto processor uses 391 slices, attains a maximum frequency of 161 MHz, has a latency of 4.45 ms, and consumes 77 mW of power. These results, along with a comparison to state-of-the-art designs, clearly demonstrate the practicality of our crypto processor for applications requiring efficient and compact cryptographic computations.
Title: Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications
Description:
This paper proposes a novel hardware design for a compact crypto processor devoted to elliptic-curve point multiplication over GF(2233).
We focus on minimizing hardware usage, which we obtain using an iterative bit–serial finite field modular multiplier for polynomial coefficient multiplication.
The same multiplier is also used for modular squares and inversion computations, further optimizing the hardware footprint.
Our design offers flexibility by permitting users to load different curve parameters and secret keys while keeping a low-area hardware design.
To efficiently generate the control signals, we utilize a finite-state-machine-based controller.
We have implemented the proposed crypto processor on Virtex-6 and Virtex-7 FPGA devices, and we have evaluated its performance at clock frequencies of 100, 50, and 10 MHz.
Specifically, for one point multiplication computation on Virtex-7 FPGA, our crypto processor uses 391 slices, attains a maximum frequency of 161 MHz, has a latency of 4.
45 ms, and consumes 77 mW of power.
These results, along with a comparison to state-of-the-art designs, clearly demonstrate the practicality of our crypto processor for applications requiring efficient and compact cryptographic computations.

Related Results

Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
The Internet of Things’ (IoT) market is expected to grow exponentially at the global level in the coming years, due to the proliferation of more reliable and faster networks result...
Faster ECC over
Faster ECC over
In this paper, we show efficient elliptic curve cryptography implementations over advanced ARMv8 processor. We improve the previous binary field multiplication over the processor w...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Masking FALCON’s Floating-Point Multiplication in Hardware
Masking FALCON’s Floating-Point Multiplication in Hardware
Floating-point arithmetic is a cornerstone in a wide array of computational domains, and it recently became a building block for the FALCON post-quantum digital signature algorithm...
Curve Shape Modification and Fairness Evaluation
Curve Shape Modification and Fairness Evaluation
A method to generate a quintic NURBS curve which passes through the given points is described. In this case, there are four more equations than there are positions of the control p...
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Potential Vulnerabilities of Cryptographic Primitives in Modern Blockchain Platforms
Today, blockchain technologies are a separate, rapidly developing area. With rapid development, they open up a number of scientific problems. One of these problems is the problem o...
Large families of elliptic curves ordered by conductor
Large families of elliptic curves ordered by conductor
In this paper we study the family of elliptic curves $E/{{\mathbb {Q}}}$, having good reduction at $2$ and $3$, and whose $j$-invariants are small. Within this set of elliptic curv...

Back to Top