Academia.eduAcademia.edu

Outline

On the hardware design of an elliptic curve cryptosystem

Proceedings of the Fifth Mexican International Conference in Computer Science, 2004. ENC 2004.

Abstract

We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature. The architecture is described by using hardware description languages, specifically Handel C and VHDL. Because of the sequential nature of the cryptographic algorithms, they are written in Handel C language. The critical part of the cryptosystem is a module performing the scalar multiplication operation. This module has been written in VHDL to let further improvements. The points of the elliptic curve are represented in projective coordinates working over the two-characteristic finite field and using polynomial basis. A prototype of this hardware architecture is implemented on a Xilinx Virtex II FPGA device.

References (21)

  1. American Bankers Association. ANSI X9.62-1998: Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA).
  2. R. Dahab and J. López. An Overview of El- liptic Curve Criptography. Technical Report, IC-00-10, http://citeseer.nj.nec.com/333066.html.
  3. A. Daly et al. Fast Modular Division for Application in ECC on Reconfigurable Logic. In Proc. of 13th Interna- tional Conference on Field Programmable Logic and Appli- cation, FPL'2003, volume 2778 of Lecture Notes in Com- puter Science, pages 786-795, Lisbon, Portugal, September 2003. Springer.
  4. W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, IT-22(2/3):644- 654, November 1976.
  5. H. Eberle, N. Gura, and S. Chang. A Cryptographic Pro- cessor for Arbitrary Elliptic Curves over GF(2 m ). In Proc. of IEEE 14th International Conference on Application- specific Systems, Architectures and Processors,ASAP'2003, The Hague, The Netherlands, pages 444-454, June 2003.
  6. M. Ernest et al. A Reconfigurable System on Chip Imple- mentation for Elliptic Curve Cryptography over GF(2 n ). In Proc. of the 4th International Workshop on Cryptographic Hardware and Embedded Systems -CHES'2002, volume 2523 of Lecture Notes in Computer Science, pages 381-399, Redwood Shores, CA, August 2002. Springer.
  7. M. Ernest et al. Rapid Prototyping for Hardware Accelerated Elliptic Curve Public Key Cryptosystems. In Proc. of 12th IEEE Workshop on Rapid System Prototyping, RSP'2001, pages 24-31, Monterey, CA, June 2001.
  8. D. Hankerson, L. López, and A. Menezes. Software Implementation of Elliptic Curve Cryptography over Bi- nary Fields. In Proc. of the Second International Work- shop on Cryptographic Hardware and Embedded Systems, CHES'2000, volume 1965 of Lecture Notes in Computer Sci- ence, pages 1-24, Worcester, MA, August 2000. Springer.
  9. IEEE P1363 Committee. Standards Specification for Public key Cryptography, http://grouper.ieee.org/groups/1363/.
  10. T. Kerins et al. Fully Parameterizable Elliptic Curve Cryp- tography Processor over GF(2 m ). In Proc. of 12th Interna- tional Conference on Field Programmable Logic and Appli- cation, FPL'2002, volume 2438 of Lecture Notes in Com- puter Science, pages 750-759, Montpellier, France, Septem- ber 2002. Springer.
  11. N. Koblitz. Elliptic Curve Cryptosystems. Mathematics of Computation, 48(177):203-209, November 1987.
  12. N. Koblitz, S. Vastone, and A. Menezes. The State of Ellip- tic Curve Cryptography. Designs, Codes and Cryptography, 19(2/3):173-193, March 2000.
  13. E. Konstantinou, Y. Stamatiou, and C. Zaroliagis. Software Library for Elliptic Curve Cryptography. In Proc. of 10th Annual European Symposium on Algorithms, ESA'2002, vol- ume 2461 of Lecture Notes in Computer Science, pages 625- 637, Rome, Italy, September 2002. Springer.
  14. V. Miller. Use of Elliptic Curves in Cryptography. In Proc. of Advances in Cryptology, CRYPTO'85, pages 417-426, Santa Barbara, CA, August 1985.
  15. NIST. Recommended Elliptic Curves for Federal Govern- ment Use, http://csrc.nist.gov/csrc/fedstandards.html.
  16. S. Okada et al. Implementation of Elliptic Curve Crypto- graphic Coprocessor over GF(2 m ) on a FPGA. In Proc. of the Second International Workshop on Cryptographic Hard- ware and Embedded Systems, CHES'2000, volume 1965 of Lecture Notes in Computer Science, pages 25-40, Worces- ter, MA, August 2000. Springer.
  17. G. Orlando and C. Paar. A High-Performance Reconfig- urable Elliptic Curve Processor for GF(2 m ). In Proc. of the Second International Workshop on Cryptographic Hard- ware and Embedded Systems, CHES'2000, volume 1965 of Lecture Notes in Computer Science, pages 41-56, Worces- ter, MA, August 2000. Springer.
  18. A. Satoh and K. Takano. A Scalable Dual-Field Elliptic Curve Cryptographic Processor. Transactions on Comput- ers, 52(4):449-460, April 2003.
  19. SEC1. Elliptic Curve Cryptography: Standards for Efficient Cryptography Group, http://www.secg.org.
  20. W. Stallings. Cryptography and Network Security. Prentice Hall, NJ, 2003.
  21. A. Weimerskirch, C. Paar, and S. Chang. Elliptic Curve Cryptography on a Palm OS Device. In Proc. of the 6th Aus- tralasian Conference, ACISP'2001, volume 2119 of Lecture Notes in Computer Science, pages 502-513, Sydney, Aus- tralia, July 2001. Springer.