• DocumentCode
    40832
  • Title

    Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications

  • Author

    Azarderakhsh, Reza ; Jarvinen, K.U. ; Mozaffari-Kermani, Mehran

  • Author_Institution
    Dept. of Combinatorics & Optimization, Univ. of Waterloo, Waterloo, ON, Canada
  • Volume
    61
  • Issue
    4
  • fYear
    2014
  • fDate
    Apr-14
  • Firstpage
    1144
  • Lastpage
    1155
  • Abstract
    Recently, considerable research has been performed in cryptography and security to optimize the area, power, timing, and energy needed for the point multiplication operations over binary elliptic curves. In this paper, we propose an efficient implementation of point multiplication on Koblitz curves targeting extremely-constrained, secure applications. We utilize the Gaussian normal basis (GNB) representation of field elements over GF(2m) and employ an efficient bit-level GNB multiplier. One advantage of this GNB multiplier is that we are able to reduce the hardware complexity through sharing the addition/accumulation with other field additions. We utilized the special property of normal basis representation and squarings are implemented very efficiently by only rewiring in hardware. We introduce a new technique for point addition in affine coordinate which requires fewer registers. Based on this technique, we propose an extremely small processor architecture for point multiplication. Through application-specific integrated circuit (ASIC) implementations, we evaluate the area, performance, and energy consumption of the proposed crypto-processor. Utilizing two different working frequencies, it is shown that the proposed architecture reaches better results compared to the previous works, making it suitable for extremely-constrained, secure environments.
  • Keywords
    Gaussian processes; public key cryptography; ASIC implementations; GNB representation; Gaussian normal basis representation; Koblitz curves; application-specific integrated circuit; binary elliptic curve cryptography; crypto-processor; efficient bit-level GNB multiplier; energy consumption; extremely constrained secure applications; hardware complexity; point multiplication operations; small processor architecture; Complexity theory; Computer architecture; Elliptic curve cryptography; Gaussian processes; Hardware; Registers; Crypto-processor; Gaussian normal basis (GNB); Koblitz curves; RFID; point multiplication; security; wireless sensor networks;
  • fLanguage
    English
  • Journal_Title
    Circuits and Systems I: Regular Papers, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1549-8328
  • Type

    jour

  • DOI
    10.1109/TCSI.2013.2283691
  • Filename
    6693767