HLS-centric DSE and Optimization for Dynamically Reconfigurable Elliptic Curve Cryptography (ReCC)

Arthur Silitonga, Yigit Kiyak, J. Becker
{"title":"HLS-centric DSE and Optimization for Dynamically Reconfigurable Elliptic Curve Cryptography (ReCC)","authors":"Arthur Silitonga, Yigit Kiyak, J. Becker","doi":"10.1109/asid52932.2021.9651483","DOIUrl":null,"url":null,"abstract":"Asymmetric cryptography is frequently used for key exchanges and signatures in today's secure data transmissions, for instance, Elliptic Curve Cryptography (ECC). This paper describes our ECC-based cryptographic algorithms implementation on a low-end All Programmable System-on-Chip (APSoC) imposed upon its Dynamic Partial Reconfiguration (DPR) due to the target platform's limited resource. Our asymmetric cryptosystem is based on elliptic curves defined over prime fields and utilizes a dynamic change of multiple key lengths. High-Level Synthesis (HLS) is the basis of our Design Space Exploration (DSE) and hardware implementation. The design is adapted to be algorithmically robust against numerous existing types of attacks. Referring to various possible key lengths, the provided modes are 192, 256, 384, and 512 bits during the design time. An optimized result in design time shows an implementation of the key length of 512 bits is inapplicable due to FPGA resources' plethora in our targeted APSoC. An optimized design is implemented and compared to particularly related works. Indeed, DPR usage brings an advantage that resources can be reused for ECC with various key lengths, other implementable crypto algorithms, or non-crypto designs.","PeriodicalId":150884,"journal":{"name":"2021 IEEE 15th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE 15th International Conference on Anti-counterfeiting, Security, and Identification (ASID)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/asid52932.2021.9651483","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Asymmetric cryptography is frequently used for key exchanges and signatures in today's secure data transmissions, for instance, Elliptic Curve Cryptography (ECC). This paper describes our ECC-based cryptographic algorithms implementation on a low-end All Programmable System-on-Chip (APSoC) imposed upon its Dynamic Partial Reconfiguration (DPR) due to the target platform's limited resource. Our asymmetric cryptosystem is based on elliptic curves defined over prime fields and utilizes a dynamic change of multiple key lengths. High-Level Synthesis (HLS) is the basis of our Design Space Exploration (DSE) and hardware implementation. The design is adapted to be algorithmically robust against numerous existing types of attacks. Referring to various possible key lengths, the provided modes are 192, 256, 384, and 512 bits during the design time. An optimized result in design time shows an implementation of the key length of 512 bits is inapplicable due to FPGA resources' plethora in our targeted APSoC. An optimized design is implemented and compared to particularly related works. Indeed, DPR usage brings an advantage that resources can be reused for ECC with various key lengths, other implementable crypto algorithms, or non-crypto designs.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
以hls为中心的动态可重构椭圆曲线密码的DSE及优化
在当今的安全数据传输中,非对称加密经常用于密钥交换和签名,例如椭圆曲线加密(ECC)。本文描述了我们基于ecc的加密算法在低端全可编程单片系统(APSoC)上的实现,由于目标平台的资源有限,它被强加于其动态部分重构(DPR)。我们的非对称密码系统基于定义在素域上的椭圆曲线,并利用多个密钥长度的动态变化。高级综合(HLS)是我们的设计空间探索(DSE)和硬件实现的基础。该设计在算法上对许多现有类型的攻击具有鲁棒性。参考各种可能的密钥长度,在设计期间提供的模式是192、256、384和512位。设计时间的优化结果表明,由于FPGA资源在我们的目标APSoC中过多,512位密钥长度的实现不适用。实现了优化设计,并与具体相关工作进行了比较。事实上,DPR的使用带来了一个优势,即资源可以通过各种密钥长度、其他可实现的加密算法或非加密设计重新用于ECC。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
An Approximate Adder Design Based on Inexact Full Adders A Single Event Effect Simulation Method for RISC-V Processor A Precise 3D Positioning Approach Based on UWB with Reduced Base Stations Digital Decimation Filter Design for a 3rd-Order Sigma-Delta Modulator with Achieving 129 dB SNR VLSI Architecture Design for Adder Convolution Neural Network Accelerator
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1