Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications

Document Type

Article

Publication Date

4-2014

Keywords

Crypto-processor, Gaussian normal basis (GNB), Koblitz curves, point multiplication, RFID, security, wireless sensor networks

Digital Object Identifier (DOI)

https://doi.org/10.1109/TCSI.2013.2283691

Abstract

Recently, considerable research has been performed in cryptography and security to optimize the area, power, timing, and energy needed for the point multiplication operations over binary elliptic curves. In this paper, we propose an efficient implementation of point multiplication on Koblitz curves targeting extremely-constrained, secure applications. We utilize the Gaussian normal basis (GNB) representation of field elements over GF(2m) and employ an efficient bit-level GNB multiplier. One advantage of this GNB multiplier is that we are able to reduce the hardware complexity through sharing the addition/accumulation with other field additions. We utilized the special property of normal basis representation and squarings are implemented very efficiently by only rewiring in hardware. We introduce a new technique for point addition in affine coordinate which requires fewer registers. Based on this technique, we propose an extremely small processor architecture for point multiplication. Through application-specific integrated circuit (ASIC) implementations, we evaluate the area, performance, and energy consumption of the proposed crypto-processor. Utilizing two different working frequencies, it is shown that the proposed architecture reaches better results compared to the previous works, making it suitable for extremely-constrained, secure environments.

Was this content written or created while at USF?

No

Citation / Publisher Attribution

IEEE Transactions on Circuits and Systems I: Regular Papers, v. 61, issue 4, p. 1144-1155

https://doi.org/10.1109/TCSI.2013.2283691

Share

COinS