EC-Crypto: Highly Efficient Area-Delay Optimized Elliptic Curve Cryptography Processor
نویسندگان
چکیده
Elliptic Curve Cryptography (ECC) based security protocols require much shorter key space which makes ECC the most suitable option for resource-limited devices as compared to other public cryptography (PKC) schemes. This paper presents a highly efficient area-delay optimized crypto processor over general prime field ( $\mathbb {F}_{p}$ ). It is structured on new novel finite multiplier (FFM) where several optimization techniques have been incorporated shorten latency and hardware resource consumption. The proposed FFM architecture embedded with adder/subtractor (FFAS) unit utilized perform FFAS operations instead of deploying dedicated unit. Common Z (Co-Z) coordinates Montgomery ladder method are used compute point multiplication, core operation in all ECC-based protocols. work also proposes an scheduling strategy execute low-level arithmetic primitives minimum employed units. Due these techniques, resources, latency, throughput. captured Verilog-HDL, synthesized, implemented Virtex-7, Kintex-7, Virtex-6 FPGA platforms using Xilinx Vivado ISE Design Suite tools. On Virtex-7 platform, it computes single 256-bit scalar multiplication primitive notation="LaTeX">$0.7~m\text{s}$ , consumes just 6.2K slices, delivers throughput 1428 per second. implementation results show that design outperforming state-of-the-art by providing better product higher efficiency. Therefore, has potential be deployed many applications both requirements critical.
منابع مشابه
Elliptic Curve Crypto-processor
In this paper, we propose an elliptic curve key generation processor over GF(2 163 ) scheme based on the Montgomery scalar multiplication algorithm. The new architecture is performed using polynomial basis. The Finite Field operations use a cellular automata multiplier and Fermat algorithm for inversion. For real time implementation, the architecture has been tested on an ISE 9.1 Software using...
متن کاملA power-optimized low-energy elliptic-curve crypto-processor
This paper presents a low-energy prime-field elliptic-curve cryptography (ECC) hardware processor, suitable for low-power and/or energy-efficient applications and systems. The ECC processor is obtained by power-optimizing a previously reported design. The optimization is performed by making the power consumption profile of the processor as uniform as possible, in an attempt to increase the seco...
متن کاملHighly Efficient Elliptic Curve Crypto-Processor with Parallel GF(2) Field Multipliers
This study presents a high performance GF(2) Elliptic Curve Crypto-processor architecture. The proposed architecture exploits parallelism at the projective coordinate level to perform parallel field multiplications. In the proposed architecture, normal basis representation is used. Comparisons between the Projective, Jacobian and Mixed coordinate systems using sequential and parallel designs ar...
متن کاملCompact and Scalable Elliptic Curve Crypto Processor in Binary Field
Elliptic Curve Cryptography plays a vital role in securing the information for the past two decades. Implementing ECC in hardware is more efficient than software. A processor is said to be compact, if its implementation space is small compared to its execution speed and is scalable if this processor is used with different key sizes. Different metrics such as execution time, implementation space...
متن کاملVLSI core architecture for GF(p) elliptic curve crypto processor
A novel GF(p) crypto processor core architecture is presented in this paper. The core is used to implement GF(p) Elliptic Curve Cryptosystem (ECC). The architecture is such that a single core can be used to implement ECC or alternatively a two core solution can be adopted. As a result, the core architecture allows the exploitation of the parallelism that exists in elliptic curve point addition ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2023
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2023.3282781