Scalable unified dual-radix architecture for Montgomery multiplication in GF(P) and GF(2n)

Kazuyuki Tanimura, Ryuta Nara, Shunitsu Kohara, K. Shimizu, Youhua Shi, N. Togawa, M. Yanagisawa, T. Ohtsuki
{"title":"Scalable unified dual-radix architecture for Montgomery multiplication in GF(P) and GF(2n)","authors":"Kazuyuki Tanimura, Ryuta Nara, Shunitsu Kohara, K. Shimizu, Youhua Shi, N. Togawa, M. Yanagisawa, T. Ohtsuki","doi":"10.1109/ASPDAC.2008.4484041","DOIUrl":null,"url":null,"abstract":"Modular multiplication is the most dominant arithmetic operation in elliptic curve cryptography (ECC), which is a type of public-key cryptography. Montgomery multiplication is commonly used as a technique for the modular multiplication and required scalability since the bit length of operands varies depending on the security levels. Also, ECC is performed in GF(P) or GF(2n), and unified architectures for GF(P) and GF(2n) multiplier are needed. However, in previous works, changing frequency or dual-radix architecture is necessary to deal with delay-time difference between GF(P) and GF(2n) circuits of the multiplier because the critical path of GF(P) circuit is longer. This paper proposes a scalable unified dual-radix architecture for Montgomery multiplication in GF(P) and GF(2n). The proposed architecture unifies 4 parallel radix-216 multipliers in GF(P) and a radix-264 multiplier in GF(2n) into a single unit. Applying lower radix to GF(P) multiplier shortens its critical path and makes it possible to compute the operands in the two fields using the same multiplier at the same frequency so that clock dividers to deal with the delay-time difference are not required. Moreover, parallel architecture in GF(P) reduces the clock cycles increased by dual-radix approach. Consequently, the proposed architecture achieves to compute GF(P) 256-bit Montgomery multiplication in 0.23 mus.","PeriodicalId":277556,"journal":{"name":"2008 Asia and South Pacific Design Automation Conference","volume":"73 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Asia and South Pacific Design Automation Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASPDAC.2008.4484041","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Modular multiplication is the most dominant arithmetic operation in elliptic curve cryptography (ECC), which is a type of public-key cryptography. Montgomery multiplication is commonly used as a technique for the modular multiplication and required scalability since the bit length of operands varies depending on the security levels. Also, ECC is performed in GF(P) or GF(2n), and unified architectures for GF(P) and GF(2n) multiplier are needed. However, in previous works, changing frequency or dual-radix architecture is necessary to deal with delay-time difference between GF(P) and GF(2n) circuits of the multiplier because the critical path of GF(P) circuit is longer. This paper proposes a scalable unified dual-radix architecture for Montgomery multiplication in GF(P) and GF(2n). The proposed architecture unifies 4 parallel radix-216 multipliers in GF(P) and a radix-264 multiplier in GF(2n) into a single unit. Applying lower radix to GF(P) multiplier shortens its critical path and makes it possible to compute the operands in the two fields using the same multiplier at the same frequency so that clock dividers to deal with the delay-time difference are not required. Moreover, parallel architecture in GF(P) reduces the clock cycles increased by dual-radix approach. Consequently, the proposed architecture achieves to compute GF(P) 256-bit Montgomery multiplication in 0.23 mus.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
GF(P)和GF(2n)中Montgomery乘法的可扩展统一双基结构
模乘法运算是椭圆曲线密码(ECC)中最主要的算术运算,椭圆曲线密码是一种公钥密码。Montgomery乘法通常用作模块化乘法和所需可伸缩性的技术,因为操作数的位长度根据安全级别而变化。此外,ECC是在GF(P)或GF(2n)中进行的,并且需要GF(P)和GF(2n)乘法器的统一架构。然而,在以往的工作中,由于GF(P)电路的关键路径较长,需要改变频率或双基结构来处理乘法器的GF(P)电路和GF(2n)电路之间的延迟时间差。本文提出了GF(P)和GF(2n)中Montgomery乘法的可扩展统一双基体系结构。所提出的架构将GF(P)中的4个并行基数-216乘法器和GF(2n)中的基数-264乘法器统一为一个单元。对GF(P)乘法器应用较低的基数可以缩短其关键路径,并且可以使用相同的乘法器以相同的频率计算两个字段中的操作数,从而不需要时钟分频器来处理延迟时间差。此外,GF(P)的并行架构减少了双基数方法增加的时钟周期。因此,所提出的架构实现了在0.23 mus内计算GF(P) 256位蒙哥马利乘法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Panel: Best ways to use billions of devices on a chip Large-scale fixed-outline floorplanning design using convex optimization techniques The Shining embedded system design methodology based on self dynamic reconfigurable architectures Hybrid solid-state disks: Combining heterogeneous NAND flash in large SSDs Load scheduling: Reducing pressure on distributed register files for free
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1