Efficient Hardware Implementation of Modular Arithmetic and Group Operation Over Prime Field
Internet of Things and Cloud Computing
Volume 7, Issue 1, March 2019, Pages: 31-38
Received: May 5, 2019; Published: Jun. 15, 2019
Views 240      Downloads 59
Sakib Absar, Department of Electrical and Electronic Engineering (EEE), Khulna University of Engineering & Technology (KUET), Khulna, Bangladesh
Md Selim Hossain, Department of Electrical and Electronic Engineering (EEE), Khulna University of Engineering & Technology (KUET), Khulna, Bangladesh
Yinan Kong, School of Engineering, Macquarie University, Sydney, NSW, Australia
Article Tools
Follow on us
The need for secure communication over the network has increased drastically over recent years, and Elliptic Curve Cryptography (ECC) carries out a significant role in moving secured information. In this work, a hardware implementation of modular arithmetic and group operations over the prime field for an Elliptic Curve Cryptography Processor (ECP) for an efficient security system is proposed. The modular addition or subtraction operation takes only one clock cycle and the modular multiplication, which is designed using the interleaved modular multiplication method, requires 257 clock cycles. For elliptic curve group operation separate point doubling (PD) and point addition (PA) architectures are implemented in Jacobean coordinates. These new architectures are simulated in a Xilinx ISE 14.7. After that, the architectures are implemented in Xilinx Virtex-7 field-programmable gate array (FPGA) with the VHDL language. Proposed modular arithmetic and group operations can be utilized to design an Elliptic Curve Point Multiplication (ECPM).
Elliptic Curve Cryptography (ECC), Modular Arithmetic, Elliptic Curve Group Operation, Point Doubling (PD), Point Addition (PA), Field-Programmable Gate Array (FPGA)
To cite this article
Sakib Absar, Md Selim Hossain, Yinan Kong, Efficient Hardware Implementation of Modular Arithmetic and Group Operation Over Prime Field, Internet of Things and Cloud Computing. Vol. 7, No. 1, 2019, pp. 31-38. doi: 10.11648/j.iotcc.20190701.15
Koblitz, N.: ‘Elliptic curve cryptosystems’, Math. Comput., 1987, vol. 48, pp. 203–209.
Miller, V. S.: ‘Use of elliptic curves in cryptography’. In Proc. CRYPTO 1985, 1986, pp. 417–426.
“IEEE standard specifications for public-key cryptography,” IEEE Std 1363-2000, pp. 1–228, Aug. 2000.
X 9.62 public key cryptography for the financial services industry: Elliptic curve digital signature algorithm (ECDSA), “American National Standards Institute,” 1999.
Rivest, R. L., Shamir, A., Adleman, L.: ‘A method for obtaining digital signatures and public-key cryptosystems’, Commun. ACM, 1978, 21, (2), pp. 120–126.
J. W. Lee, S.-C. Chung, H. C. Chang, and C. Y. Lee: “Efficient power analysis-resistant dual-field elliptic curve cryptographic processor using heterogeneous dual-processing-element architecture,” IEEE Trans. VLSI Syst., vol. 22, pp. 49-61, Jan. 2014.
M. S. Hossain, Y. Kong: ‘FPGA-Based Efficient Modular Multiplication for Elliptic Curve Cryptography’, in ITNAC, pp. 191-195, Nov. 2015.
M. R. Hossain, M. S. Hossain: ‘Efficient FPGA implementation of modular arithmetic for elliptic curve cryptography’, ECCE 2019, Cox’s Bazar, Bangladesh, 2019, pp. 1-6.
M. S. Hossain, “High-Performance Hardware Implementation of Elliptic Curve Cryptography”, Research Book, Doctor of Philosophy, Department of Engineering, Faculty of Science and Engineering, Macquarie University, Sydney, Australia, Jun. 2017.
M. S. Hossain, Y. Kong, E. Saeedi, N. C. Vayalil: “High-Performance elliptic curve cryptography processor over NIST prime fields,” IET Computers & Digital Techniques, 2017, vol. 11, no. 1, pp. 33-42.
M. Jaiswal, K. Lata: ‘Hardware implementation of text encryption using elliptic curve cryptography over 192 bit prime field’, ICACCI 2018, pp. 343-349, Sept. 2018.
Megha M. Panchbhai, U. S. Ghodeswar: ‘Implementation of point addition & point doubling for elliptic curve’ IEEE ICCSP 2015, Melmaruvathur, India, 2015, pp. 746-749.
P. Longa, A. Miri: ‘Fast and flexible elliptic curve point arithmetic over prime fields’, IEEE Trans., vol. 57, pp. 289-302, Mar. 2008.
A. Satoh, K. Takano: ‘A scalable dual-field elliptic curve cryptography processor’, IEEE Trans., vol. 52, pp. 449-460, Apr. 2003.
D. Hankerson, A. J. Menezes, and S. Vanstone, ‘Guide to Elliptic Curve Cryptography’. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2003.
G. Sutter, J. Deschamps, and J. Imana, “Efficient elliptic curve point multiplication using digit-serial binary field operations,” IEEE Trans. Ind. Electron., vol. 60, no. 1, pp. 217–225, Jan. 2013.
M. S. Hossain, E. Saeedi, Y. Kong: ‘Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications’, PLOS ONE, May 2017.
G. Orlando and C. Paar, “A high-performance reconfigurable elliptic curve processor for GF(2m),” in Proc. CHES, 2000, pp. 41–56.
K. Ananyi, H. Alrimeih, D. Rakhmatov: ‘Flexible hardware processor for elliptic curve cryptography over NIST prime fields’, IEEE Trans. VLSI Syst., vol. 17, no. 8, pp. 1099-1112, Aug. 2009.
M. S. Rahman, M. S. Hossain, E. H. Rahat, D. R. Dipta, H. M. R. Faruque, F. K. Fattah: ‘Efficient hardware implementation of 256-bit ECC processor over prime field’, ECCE 2019, Cox'sBazar, Bangladesh, 2019, pp. 1-6
C. J. McIvor, M. Mchoone, J. V. McCanny, “Hardware elliptic curve cryptography processor over GF (p),”IEEE Trans. Circuits Syst. I, 2006, vol. 53, pp. 1946-1957.
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
Tel: (001)347-983-5186