DocumentCode
40832
Title
Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications
Author
Azarderakhsh, Reza ; Jarvinen, K.U. ; Mozaffari-Kermani, Mehran
Author_Institution
Dept. of Combinatorics & Optimization, Univ. of Waterloo, Waterloo, ON, Canada
Volume
61
Issue
4
fYear
2014
fDate
Apr-14
Firstpage
1144
Lastpage
1155
Abstract
Recently, considerable research has been performed in cryptography and security to optimize the area, power, timing, and energy needed for the point multiplication operations over binary elliptic curves. In this paper, we propose an efficient implementation of point multiplication on Koblitz curves targeting extremely-constrained, secure applications. We utilize the Gaussian normal basis (GNB) representation of field elements over GF(2m) and employ an efficient bit-level GNB multiplier. One advantage of this GNB multiplier is that we are able to reduce the hardware complexity through sharing the addition/accumulation with other field additions. We utilized the special property of normal basis representation and squarings are implemented very efficiently by only rewiring in hardware. We introduce a new technique for point addition in affine coordinate which requires fewer registers. Based on this technique, we propose an extremely small processor architecture for point multiplication. Through application-specific integrated circuit (ASIC) implementations, we evaluate the area, performance, and energy consumption of the proposed crypto-processor. Utilizing two different working frequencies, it is shown that the proposed architecture reaches better results compared to the previous works, making it suitable for extremely-constrained, secure environments.
Keywords
Gaussian processes; public key cryptography; ASIC implementations; GNB representation; Gaussian normal basis representation; Koblitz curves; application-specific integrated circuit; binary elliptic curve cryptography; crypto-processor; efficient bit-level GNB multiplier; energy consumption; extremely constrained secure applications; hardware complexity; point multiplication operations; small processor architecture; Complexity theory; Computer architecture; Elliptic curve cryptography; Gaussian processes; Hardware; Registers; Crypto-processor; Gaussian normal basis (GNB); Koblitz curves; RFID; point multiplication; security; wireless sensor networks;
fLanguage
English
Journal_Title
Circuits and Systems I: Regular Papers, IEEE Transactions on
Publisher
ieee
ISSN
1549-8328
Type
jour
DOI
10.1109/TCSI.2013.2283691
Filename
6693767
Link To Document