Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, Hamdi Bilgacem
{"title":"安全标量乘法算法的硬件实现","authors":"Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, Hamdi Bilgacem","doi":"10.1109/SETIT54465.2022.9875647","DOIUrl":null,"url":null,"abstract":"ECC (Elliptic Curves Cryptosystems) are the most popular and efficient encryption systems used since 1985. They are being increasingly integrated in high security applications such as RFID devices, smart cards, bank-cards, etc. To be suitable for these applications, a lightweight implementation of the scalar multiplication operation is required. To achieve this goal, it is necessary to choose the parameters responsible for the cost reduction of the elliptic curve implementation. In this paper, we will first specify the elliptic curve parameters that are responsible for the optimization of the implementation of the scalar multiplication algorithm. Then, we will choose the most secure scalar multiplication algorithm to be implemented for security applications. The hardware implementation of our ECC architecture, using Virtex-7 board, requires a number of 6549 gates as total area requirement.","PeriodicalId":126155,"journal":{"name":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hardware Implementation of Secure scalar multiplication Algorithm\",\"authors\":\"Souhir Gabsi, Yassin Kortli, V. Beroulle, Yann Kieffer, Hamdi Bilgacem\",\"doi\":\"10.1109/SETIT54465.2022.9875647\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ECC (Elliptic Curves Cryptosystems) are the most popular and efficient encryption systems used since 1985. They are being increasingly integrated in high security applications such as RFID devices, smart cards, bank-cards, etc. To be suitable for these applications, a lightweight implementation of the scalar multiplication operation is required. To achieve this goal, it is necessary to choose the parameters responsible for the cost reduction of the elliptic curve implementation. In this paper, we will first specify the elliptic curve parameters that are responsible for the optimization of the implementation of the scalar multiplication algorithm. Then, we will choose the most secure scalar multiplication algorithm to be implemented for security applications. The hardware implementation of our ECC architecture, using Virtex-7 board, requires a number of 6549 gates as total area requirement.\",\"PeriodicalId\":126155,\"journal\":{\"name\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-05-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SETIT54465.2022.9875647\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SETIT54465.2022.9875647","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hardware Implementation of Secure scalar multiplication Algorithm
ECC (Elliptic Curves Cryptosystems) are the most popular and efficient encryption systems used since 1985. They are being increasingly integrated in high security applications such as RFID devices, smart cards, bank-cards, etc. To be suitable for these applications, a lightweight implementation of the scalar multiplication operation is required. To achieve this goal, it is necessary to choose the parameters responsible for the cost reduction of the elliptic curve implementation. In this paper, we will first specify the elliptic curve parameters that are responsible for the optimization of the implementation of the scalar multiplication algorithm. Then, we will choose the most secure scalar multiplication algorithm to be implemented for security applications. The hardware implementation of our ECC architecture, using Virtex-7 board, requires a number of 6549 gates as total area requirement.