Implementation of Generic and Efficient Architecture of Elliptic Curve Cryptography over Various GF(p) for Higher Data Security

Kiritkumar Vishnubhai Patel, Mihir V. Shah

Abstract


Elliptic Curve Cryptography (ECC) has recognized much more attention over the last few years and has time-honored itself among the renowned public key cryptography schemes. The main feature of ECC is that shorter keys can be used as the best option for implementation of public key cryptography in resource-constrained (memory, power, and speed) devices like the Internet of Things (IoT), wireless sensor based applications, etc. The performance of hardware implementation for ECC is affected by basic design elements such as a coordinate system, modular arithmetic algorithms, implementation target, and underlying finite fields. This paper shows the generic structure of the ECC system implementation which allows the different types of designing parameters like elliptic curve, Galois prime finite field GF(p), and input type. The ECC system is analyzed with performance parameters such as required memory, elapsed time, and process complexity on the MATLAB platform. The simulations are carried out on the 8th generation Intel core i7 processor with the specifications of 8 GB RAM, 3.1 GHz, and 64-bit architecture. This analysis helps to design an efficient and high performance architecture of the ECC system on Application Specific Integrated Circuit (ASIC) and Field Programmable Gate Array (FPGA).Elliptic Curve Cryptography (ECC) has recognized much more attention over the last few years and has time-honored itself among the renowned public key cryptography schemes. The main feature of ECC is that shorter keys can be used as the best option for implementation of public key cryptography in resource-constrained (memory, power, and speed) devices like the Internet of Things (IoT), wireless sensor based applications, etc. The performance of hardware implementation for ECC is affected by basic design elements such as a coordinate system, modular arithmetic algorithms, implementation target, and underlying finite fields. This paper shows the generic structure of the ECC system implementation which allows the different types of designing parameters like elliptic curve, Galois prime finite field GF(p), and input type. The ECC system is analyzed with performance parameters such as required memory, elapsed time, and process complexity on the MATLAB platform. The simulations are carried out on the 8th generation Intel core i7 processor with the specifications of 8 GB RAM, 3.1 GHz, and 64-bit architecture. This analysis helps to design an efficient and high performance architecture of the ECC system on Application Specific Integrated Circuit (ASIC) and Field Programmable Gate Array (FPGA).

Full Text:

PDF

References


V.S. Miller, “Use of elliptic curves in cryptography”, Advances in Cryptology CRYPTO 85 Proceedings, Lecture Notes in Computer Science, Springer, Berlin Heidelberg, vol. 218, pp. 417–426, 1986.

H. Marzouqi, M. Al-Qutayri, and K. Salah, “Review of Elliptic Curve Cryptography processor designs,” Elsevier Microprocess. Microsyst., vol. 39, no. 2, pp. 97–112, 2015.

C. Lee and H. Chien, “An Elliptic Curve Cryptography-Based RFID Authentication Securing E-Health System,” International Journal of Distributed Sensor Networks, doi:10.1155/2015/642425, Dec. 2015.

D. Hankerson, J.C. Lopez Hernandez and A.J. Menezes “Software implementation of Elliptic Curve Cryptography over binary fields”. In Cryptographic Hardware and Embedded Systems, CHES vol. 2, pp. 1-24, 2000.

M. Bluhm and S. Gueron, “ Fast software implementation of binary elliptic curve cryptography”, Springer, Journal of Cryptographic Engineering, vol. 5, pp. 215–226, 2015.

C. A. Lara-Nino, A. Diaz-Perez, and M. Morales-Sandoval, “Elliptic Curve Lightweight Cryptography: A Survey,” IEEE Access, vol. 6, pp. 514–550, 2018, doi: 10.1109/ACCESS.2018.2881444.

Y. Chen and C. Huang, “Efficient Operations In Large Finite Fields For Elliptic Curve Cryptographic” International Journal of Engineering Technologies and Management Research, vol 7, no.6, pp. 141–151, June 2020.

S. S. Dhanda, B. Singh, and P. Jindal, “Demystifying elliptic curve cryptography: Curve selection, implementation and countermeasures to attacks,” J. Interdiscip. Math., vol. 23, no. 2, pp. 463–470, 2020.

L. D. Singh and K. M. Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography,” Procedia Comput. Sci., vol. 54, pp. 73–82, 2015.

S. Nagaraj, G. S. V. P. Raju, and K. Koteswara Rao, “Image encryption using elliptic curve cryptography and matrix,” Procedia Comput. Sci., vol. 48, pp. 276–281, 2015.

T. Kudithi and R. Sakthivel, “An efficient hardware implementation of the elliptic curve cryptographic processor over prime field, Fp,” Int. J. Circuit Theory Appl., vol. 48, pp. 1256–1273, 2020, doi: 10.1002/cta.2759.

M. M. Islam, M. S. Hossain, M. D. Shahjalal, M. K. Hasan, and Y. M. Jang, “Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography,” IEEE Access, vol. 8, pp. 73898–73906, 2020, doi: 10.1109/ACCESS.2020.2988379.

M. M. Islam, M. S. Hossain, M. K. Hasan, M. Shahjalal, and Y. M. Jang, “FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication over Prime Field,” IEEE Access, vol. 7, pp. 178811–178826, 2019, doi: 10.1109/ACCESS.2019.2958491.

C. A. Lara-Nino, A. Diaz-Perez, and M. Morales-Sandoval, “Lightweight elliptic curve cryptography accelerator for internet of things applications,” Ad Hoc Networks, vol. 103, pp. 102159, 2020, doi: 10.1016/j.adhoc.2020.102159.

S. Asif, M. Hossain, and Y. Kong, “High-throughput multi-key elliptic curve cryptosystem based on residue number system,” IET Computers and Digital Techniques, vol. 11, no. 5, pp. 165–172, 2017.

S. Gueron and V. Krasnov, “Fast prime field elliptic-curve cryptography with 256-bit primes,” J. Cryptograph. Eng., vol. 5, no. 2, pp. 141–151, 2014.

J.Y. Lai, C.T. Huang,”Energy-adaptive dual-field processor for high performance elliptic curve cryptographic applications “, IEEE Trans. Very Large Scale Integr. VLSI Syst., vol.19 (8), pp. 1512–1517, 2011.

I. Setiadi, A. I. Kistijantoro, and A. Miyaji, “Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems,” ICAICT Int. Conf. Adv. Informatics Concepts, Theory Appl., Nov. 2015, doi: 10.1109/ICAICTA.2015.7335349.

N. Koblitz, “Elliptic curve cryptosystems - Mathematics of Computation”, Math. Comp. vol 48, pp . 203-209, 1987.


Refbacks

  • There are currently no refbacks.


------------------------------------------------------------------------------------------------------------------------

The ADBU Journal of Engineering Technology (AJET)" ISSN:2348-7305

This journal is published under the terms of the Creative Commons Attribution (CC-BY) (http://creativecommons.org/licenses/)

Number of Visitors to this Journal: