Area compactness architecture for elliptic curve cryptography

M. Janagan, M. Devanathan
{"title":"Area compactness architecture for elliptic curve cryptography","authors":"M. Janagan, M. Devanathan","doi":"10.1109/ICPRIME.2012.6208300","DOIUrl":null,"url":null,"abstract":"Elliptic curve cryptography (ECC) is an alternative to traditional public key cryptographic systems. Even though, RSA (Rivest-Shamir-Adleman) was the most prominent cryptographic scheme, it is being replaced by ECC in many systems. This is due to the fact that ECC gives higher security with shorter bit length than RSA. In Elliptic curve based algorithms elliptic curve point multiplication is the most computationally intensive operation. Therefore implementing point multiplication using hardware makes ECC more attractive for high performance servers and small devices. This paper gives the scope of Montgomery ladder computationally. Montgomery ladder algorithm is effective in computation of Elliptic Curve Point Multiplication (ECPM) when compared to Elliptic Curve Digital Signature Algorithm (ECDSA). Compactness is achieved by reducing data paths by using multipliers and carry-chain logic. Multiplier performs effectively in terms of area/time if the word size of multiplier is large. A solution for Simple Power Analysis (SPA) attack is also provided. In Montgomery modular inversion 33% of saving in Montgomery multiplication is achieved and a saving of 50% on the number of gates required in implementation can be achieved.","PeriodicalId":148511,"journal":{"name":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME-2012)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPRIME.2012.6208300","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Elliptic curve cryptography (ECC) is an alternative to traditional public key cryptographic systems. Even though, RSA (Rivest-Shamir-Adleman) was the most prominent cryptographic scheme, it is being replaced by ECC in many systems. This is due to the fact that ECC gives higher security with shorter bit length than RSA. In Elliptic curve based algorithms elliptic curve point multiplication is the most computationally intensive operation. Therefore implementing point multiplication using hardware makes ECC more attractive for high performance servers and small devices. This paper gives the scope of Montgomery ladder computationally. Montgomery ladder algorithm is effective in computation of Elliptic Curve Point Multiplication (ECPM) when compared to Elliptic Curve Digital Signature Algorithm (ECDSA). Compactness is achieved by reducing data paths by using multipliers and carry-chain logic. Multiplier performs effectively in terms of area/time if the word size of multiplier is large. A solution for Simple Power Analysis (SPA) attack is also provided. In Montgomery modular inversion 33% of saving in Montgomery multiplication is achieved and a saving of 50% on the number of gates required in implementation can be achieved.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
椭圆曲线密码的面积紧性结构
椭圆曲线加密(ECC)是传统公钥加密系统的替代方案。尽管RSA (Rivest-Shamir-Adleman)是最著名的加密方案,但在许多系统中它正在被ECC所取代。这是因为ECC比RSA提供了更高的安全性和更短的比特长度。在基于椭圆曲线的算法中,椭圆曲线点乘法运算是计算量最大的运算。因此,使用硬件实现点乘法使ECC对高性能服务器和小型设备更具吸引力。本文给出了蒙哥马利梯的计算范围。与椭圆曲线数字签名算法(ECDSA)相比,Montgomery阶梯算法在椭圆曲线点乘法(ECPM)的计算中具有较高的效率。紧凑性是通过使用乘法器和携带链逻辑减少数据路径来实现的。如果乘数的字长较大,则乘数在面积/时间方面表现有效。提出了简单功率分析(Simple Power Analysis, SPA)攻击的解决方案。在Montgomery模反转中,可以实现33%的Montgomery乘法节省,并且可以实现所需的门数节省50%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An optimized cluster based approach for multi-source multicast routing protocol in mobile ad hoc networks with differential evolution Increasing cluster uniqueness in Fuzzy C-Means through affinity measure Rule extraction from neural networks — A comparative study Text extraction from digital English comic image using two blobs extraction method A novel approach for Kannada text extraction
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1