Innovative dual-binary-field architecture for point multiplication of elliptic curve cryptography

Jiakun Li, Weijiang Wang, Jingqi Zhang, Yixuan Luo, Shiwei Ren*

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

15 引用 (Scopus)

摘要

High-performance Elliptic Curve Cryptography (ECC) implementation in encryption authentication severs has become a challenge due to the explosive growth of e-commerce's demand for speed and security. Point multiplication (PM) is the most common and complex operation in ECC which directly determines the performance of the whole system. This article proposes a 6CC-6CC (clock cycle) dual-field PM architecture and a 6CC-4CC dual-field PM architecture based on maximizing utilization of Karatsuba multipliers and re-ordering schedule strategy in PM. The Montgomery Ladder algorithm used in PM is modified to a 4CC algorithm for better resource utilization and parallel computation. To solve the frequency drop problem while working on large finite field, the PM architectures for high and low field are carefully studied to have universal critical path length and balanced performance. Both of the architectures are implemented over GF(2571) and GF(2283) on Xilinx Virtex-5 and Virtex-7 FPGAs (Field-Programmable Gate Array) for comparison. The 6CC-6CC architecture is shown to have the best performance on GF(2571), which achieves one PM operation in 17.44 μs using 81549 LUTs (Look-Up-Table) with the frequency of 197.2 MHz on Virtex-5, and 12.55 μs using 80970 LUTs with the frequency of 274.1 MHz on Virtex-7. The 6CC-4CC architecture performs better on GF(2283) with the shortest computation time. It takes only 3.21 μs to finish one PM operation on Virtex-5 and 2.22 μ s on Virtex-7, which are faster than all the previous designs. The implementation results prove that the proposed architectures have state-of-the-art performance as well as higher versatility for ECC designs.

源语言英语
文章编号9321352
页(从-至)12405-12419
页数15
期刊IEEE Access
9
DOI
出版状态已出版 - 2021

指纹

探究 'Innovative dual-binary-field architecture for point multiplication of elliptic curve cryptography' 的科研主题。它们共同构成独一无二的指纹。

引用此