The Design and Implementation of ECC High-Speed Encryption Engine Based on FPGA

Article Preview

Abstract:

Network security technology ensures secure data transmission in network. Meanwhile, it brings extra overhead of security system in terms of cost and performance, which seriously affects the rapid development of existing high-speed encryption systems. The existing encryption technology cannot meet the demand of high security, low cost and high real-time. For solving above problems, an ECC encryption engine architecture based on scalable public key cipher and a high-speed configurable multiplication algorithm are designed. The algorithm was tested on FPGA platform and the experiment results show that the system has better computation speed and lower cost overhead. By comparing with other systems, our system has benefits in terms of hardware overhead and encryption time ratio

You might also be interested in these eBooks

Info:

Periodical:

Pages:

544-548

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Cheng, M., Zhou, Y., Xin, Y., Yang, Y.: FPGA realization of ECC encryption algorithm in GF (2~ (192). Journal of Huazhong University of Science and Technology, vol. 37, no. 10, pp.9-12(2009).

Google Scholar

[2] Dan, Y., Zou, X., Liu, Z., Han, Y., Yi, L.: Design of a Fast Elliptic Curve Cryptography Processor over GF (2m). Microellectronics and Computer, vol. 25, no. 8, pp.17-21(2008).

Google Scholar

[3] Li, M., Wu, D., Dai, K., Zou, X.: Research and Design of a High-Performance Scalable Public-Key Cipher Coprocessor. Journal of Electronics, vol. 39, no. 3, pp.665-669(2011).

Google Scholar

[4] Dai, Z., Wei, X., Chen,T.: Implementation of Reconfigurable ECC Arithmetic Unit in GF(2m). Computer engineering, vol. 34, no. 5, pp.163-165(2008).

Google Scholar

[5] Chen, G., Zhu, J., Liu, M., Zeng, W.: Dual-field Modular Multiplication Algorithm and Modular Inversion Algorithm with VLSI Implementation. Journal of Electronics & Information Technology, vol. 32, no. 9, pp.2095-2100(2010).

DOI: 10.3724/sp.j.1146.2009.01258

Google Scholar

[6] Hou, Z., Li, L.: The Research on Designing and Optimizing of the Algorithm for Elliptic Curve Cryptography (ECC). Journal of Electronics, vol. 32, no. 11, pp.1904-1906(2004).

Google Scholar

[7] Guerric, M. D., Quisquater, J. J.: High speed hardware implementations of elliptic curve cryptography: a survey. Journal of Systems Architecture, vol. 53, pp.72-84(2007).

DOI: 10.1016/j.sysarc.2006.09.002

Google Scholar

[8] Rodriguez Henriquez, F., Saqib, N. A., Diaz Perez, A.: A fast parallel implementation of elliptic curve point multiplication over GF(). Micro processors and Microsystems, vol. 28, pp.329-339(2004).

DOI: 10.1016/j.micpro.2004.03.003

Google Scholar

[9] Lai, J. Y., Huang, C. T.: A highly efficient cipher processor for dual field elliptic curve cryptography. IEEE Transactions on Circuits and Systems ii: Express Briefs, vol. 56, no. 5, pp.394-398(2009).

DOI: 10.1109/tcsii.2009.2019327

Google Scholar