• DocumentCode
    51080
  • Title

    Efficient Power-Analysis-Resistant Dual-Field Elliptic Curve Cryptographic Processor Using Heterogeneous Dual-Processing-Element Architecture

  • Author

    Jen-Wei Lee ; Szu-Chi Chung ; Hsie-Chia Chang ; Chen-Yi Lee

  • Author_Institution
    Dept. of Electron. Eng., Nat. Chiao Tung Univ., Hsinchu, Taiwan
  • Volume
    22
  • Issue
    1
  • fYear
    2014
  • fDate
    Jan. 2014
  • Firstpage
    49
  • Lastpage
    61
  • Abstract
    Elliptic curve cryptography (ECC) for portable applications is in high demand to ensure secure information exchange over wireless channels. Because of the high computational complexity of ECC functions, dedicated hardware architecture is essential to provide sufficient ECC performance. Besides, crypto-ICs are vulnerable to side-channel information leakage because the private key can be revealed via power-analysis attacks. In this paper, a new heterogeneous dual-processing-element (dual-PE) architecture and a priority-oriented scheduling of right-to-left double-and-add-always EC scalar multiplication (ECSM) with randomized processing technique are proposed to achieve a power-analysis-resistant dual-field ECC (DF-ECC) processor. For this dual-PE design, a memory hierarchy with local memory synchronization scheme is also exploited to improve data bandwidth. Fabricated in a 90-nm CMOS technology, a 0.4- mm2 160-b DF-ECC chip can achieve 0.34/0.29 ms 11.7/9.3 μJ for one GF(p)/GF(2m) ECSM. Compared to other related works, our approach is advantageous not only in hardware efficiency but also in protection against power-analysis attacks.
  • Keywords
    CMOS digital integrated circuits; computational complexity; microprocessor chips; private key cryptography; public key cryptography; synchronisation; wireless channels; CMOS technology; DF-ECC chip; ECC functions; computational complexity; crypto-IC; data bandwidth; dedicated hardware architecture; dual-PE design; efficient power-analysis-resistant dual-field elliptic curve cryptographic processor; hardware efficiency; heterogeneous dual-PE architecture; heterogeneous dual-processing-element architecture; information exchange security; local memory synchronization scheme; memory hierarchy; portable application; power-analysis attacks; power-analysis-resistant DF-ECC processor; priority-oriented scheduling; private key; randomized processing technique; right-to-left double-and-add-always EC scalar multiplication; side-channel information leakage; size 90 nm; wireless channels; Algorithm design and analysis; Computer architecture; Elliptic curve cryptography; Hardware; Instruction sets; Processor scheduling; Scheduling; Dual fields; elliptic curve cryptography (ECC); heterogeneous processing-element architecture; parallel computations; power-analysis attacks;
  • fLanguage
    English
  • Journal_Title
    Very Large Scale Integration (VLSI) Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1063-8210
  • Type

    jour

  • DOI
    10.1109/TVLSI.2013.2237930
  • Filename
    6459050