Configurable Core of ECC over GF(2m)

Article Preview

Abstract:

Elliptic Curve Cryptosystem is a research focus of public key cryptography. The advantage of ECC is described in this paper, on the basis of which the architecture of the Elliptic Curve Cryptosystem is determined. We design hardware and implement addition, square, multiplication and inverse over GF(2m)using Verilog. On the basic operation, we design the scalar multiplication and accomplish the final elliptic curve encryption and decryption function. At last, we test the design in this paper with the verification model and platform are constructed and count coverage metrics ratio for it. The coverage metrics ratio is 100% and verification results is right. The core is synthesized and simulated on timing. The gate-level simulation results is the same to functional results. It’s work frequency is 125MHz.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

116-122

Citation:

Online since:

February 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] V. Miller, Uses of elliptic curves in cryptography". in Lecture Notes in Computer Science 218: Advances in Crytology – CRYPTO, 85, Berlin: Springer-Verlag, 1986, pp.417-426.

DOI: 10.1007/3-540-39799-x_31

Google Scholar

[2] N. Koblitz. Elliptic curve cryptosystems, Mathematics of Computation, vol. 48, pp.203-209, (1987).

DOI: 10.1090/s0025-5718-1987-0866109-5

Google Scholar

[3] A.W. Deng, Cryptography - Encryption Algorithm, China Water Power Press, 2006, pp.174-203.

Google Scholar

[4] S.R. Cao, H. Lone, Y. Liu, S.Q. Feng, Performance comparison of digital signature based on ECC and RSA, Modern Electronics Technique, vol. 17, pp.29-31, (2006).

Google Scholar

[5] FIPS 186-2, Digital Signature Standard (DSS), National Institute of Standards and Technology, January (2000).

Google Scholar

[6] G. Meurice de Dormale, J. -J. Quisquater, High-speed Hardware Implementations of Elliptic Curve Cryptography : A survey, Journal of Systems Architecture, vol. 53, pp.72-84, (2007).

DOI: 10.1016/j.sysarc.2006.09.002

Google Scholar

[7] D. Hankerson, A. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography, Springer- Verlag, 2004, pp.224-238.

Google Scholar

[8] X. Y Huang, Implementation algorithm optimized and chip design of ECC over binary field, Information Engineering University, pp.48-40, (2006).

Google Scholar

[9] C.J. Ren, Research and implementation of elliptic curve cryptography algorithm, Dalian University of Technology, pp.33-34, (2005).

Google Scholar

[10] D.G. Feng, Cryptanalysis, Tsinghua University Press, Guangxi Science and Technology Press, p.109, (2000).

Google Scholar

[11] M. Glasser, Advanced Verification Methodology Cookbook, Mentor Graphics Corporation, pp.21-32, (2007).

Google Scholar

[12] L. Song, K. K. Parhi. Low-energy digit-serial/parallel finite field multipliers, Journal of VLSI Signal Processing, 19(2): 149-166, July (1998).

Google Scholar