Results 1  10
of
28
Hardware Implementation of Elliptic Curve Processor over GF(p)
 International Journal of Embedded Systems
, 2003
"... This paper describes a hardware implementation of an arithmetic processor which is efficient for bitlengths suitable for both commonly used types of Public Key Cryptography (PKC), i.e., Elliptic Curve (EC) and RSA Cryptosystems. The processor consists of special operational blocks for Montgomery Mo ..."
Abstract

Cited by 31 (6 self)
 Add to MetaCart
This paper describes a hardware implementation of an arithmetic processor which is efficient for bitlengths suitable for both commonly used types of Public Key Cryptography (PKC), i.e., Elliptic Curve (EC) and RSA Cryptosystems. The processor consists of special operational blocks for Montgomery Modular Multiplication, modular addition/substraction, EC Point doubling/addition, modular multiplicative inversion, EC point multiplier, projective to affine coordinates conversion and Montgomery to normal representation conversion.
An EndtoEnd Systems Approach to Elliptic Curve Cryptography
 In Cryptographic Hardware and Embedded Systems (CHES
, 2002
"... Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolved into a mature publickey cryptosystem. Offering the smallest key size and the highest strength per bit, its computational efficiency can benefit both client devices and serv ..."
Abstract

Cited by 26 (3 self)
 Add to MetaCart
Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolved into a mature publickey cryptosystem. Offering the smallest key size and the highest strength per bit, its computational efficiency can benefit both client devices and server machines. We have designed a programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF (2^m). The accelerator is based on a scalable architecture capable of handling curves of arbitrary field degrees up to m = 255. In addition, it delivers optimized performance for a set of commonly used curves through hardwired reduction logic. A prototype implementation running in a Xilinx XCV2000E FPGA at 66.4 MHz shows a performance of 6987 point multiplications per second for GF(2^163). We have integrated ECC into OpenSSL, today's dominant implementation of the secure Internet protocol SSL, and tested it with the Apache web server and opensource web browsers.
A VLIW processor with reconfigurable instruction set for embedded applications
 IJSER © 2012 http://www.ijser.org Journal of Scientific & Engineering Research Volume 3, Issue 1, January2012 5 ISSN
, 2003
"... Abstract—This paper describes a new architecture for embedded reconfigurable computing, based on a verylong instruction word (VLIW) processor enhanced with an additional runtime configurable datapath. The reconfigurable unit is tightly coupled with the processor, featuring an applicationspecific ..."
Abstract

Cited by 20 (1 self)
 Add to MetaCart
Abstract—This paper describes a new architecture for embedded reconfigurable computing, based on a verylong instruction word (VLIW) processor enhanced with an additional runtime configurable datapath. The reconfigurable unit is tightly coupled with the processor, featuring an applicationspecific instructionset extension. Mapping computation intensive algorithmic portions on the reconfigurable unit allows a more efficient elaboration, thus leading to an improvement in both timing performance and power consumption. A test chip has been implemented in a standard 0.18 m CMOS technology. The test of a signal processing algorithmic benchmark showed speedups ranging from 4.3 to 13.5 and energy consumption reduced up to 92%. Index Terms—Energy consumption, fieldprogrammable gate array (FPGA), pipeline, reconfigurable processor. I.
A Cryptographic Processor for Arbitrary Elliptic Curves over GF(2 m
, 2003
"... We describe a cryptographic processor for Elliptic Curve Cryptography (ECC). ECC is evolving as an attractive alternative to other publickey cryptosystems such as the RivestShamirAdleman algorithm (RSA) by offering the smallest key size and the highest strength per bit. The cryptographic processo ..."
Abstract

Cited by 20 (3 self)
 Add to MetaCart
We describe a cryptographic processor for Elliptic Curve Cryptography (ECC). ECC is evolving as an attractive alternative to other publickey cryptosystems such as the RivestShamirAdleman algorithm (RSA) by offering the smallest key size and the highest strength per bit. The cryptographic processor performs point multiplication for elliptic curves over binary polynomial fields GF(2 m). In contrast to other designs that only support one curve at a time, our processor is capable of handling arbitrary curves without requiring reconfiguration. More specifically, it can handle both named curves as standardized by the National Institute for Standards and Technology (NIST) as well as any other generic curves up to a field degree of 255. Efficient support for arbitrary curves is particularly important for the targeted server applications that need to handle requests for secure connections generated by a multitude of heterogeneous client devices. Such requests may specify curves which are infrequently used or not even known at implementation time. We have implemented the cryptographic processor in a fieldprogrammable gate array (FPGA) running at a clock frequency of 66.4 MHz. Its performance is 6955 point multiplications per
ApplicationDirected Voltage Scaling
, 2002
"... Clock (and voltage) scheduling is an important technique to reduce the energy consumption of processors that support voltage scaling. It is difficult, however, to achieve good results using only statistics from the OS level when applications show bursty (unpredictable) behavior. We take the approach ..."
Abstract

Cited by 18 (0 self)
 Add to MetaCart
Clock (and voltage) scheduling is an important technique to reduce the energy consumption of processors that support voltage scaling. It is difficult, however, to achieve good results using only statistics from the OS level when applications show bursty (unpredictable) behavior. We take the approach that such applications must be made poweraware and specify their Average Execution Time (AET) and the deadline to the scheduler controlling the clock speed and processor voltage. This paper describes our Energy Priority Scheduling (EPS) algorithm supporting poweraware applications. EPS orders tasks according to how tight their deadlines are and how often tasks overlap. Lowpriority tasks are scheduled first, since they can be easily preempted to accommodate for highpriority tasks later. The EPS algorithm does not always yield the optimal schedule, but has a low complexity. We have implemented EPS on a StrongARMbased variablevoltage platform. We conducted experiments with a modified video decoder that estimates the AET of each frame. Measurements show that applicationdirected voltage scaling reduces processor power consumption with 50% for the bursty video decoder without missing any frame deadlines.
An Elliptic Curve Processor Suitable For RFIDTags
, 2006
"... RFIDTags are small devices used for identification purposes in many applications nowadays. ..."
Abstract

Cited by 16 (1 self)
 Add to MetaCart
RFIDTags are small devices used for identification purposes in many applications nowadays.
Scan Based Side Channel Attack on Dedicated Hardware Implementations of Data Encryption Standard
 in Proc. of the IEEE Int. Test Conf. (ITC), 2004
, 2004
"... Scan based test is a double edged sword. On one hand, it is a powerful test technique. On the other hand, it is an equally powerful attack tool. In this paper we show that scan chains can be used as a side channel to recover secret keys from a hardware implementation of the Data Encryption Standard ..."
Abstract

Cited by 16 (2 self)
 Add to MetaCart
Scan based test is a double edged sword. On one hand, it is a powerful test technique. On the other hand, it is an equally powerful attack tool. In this paper we show that scan chains can be used as a side channel to recover secret keys from a hardware implementation of the Data Encryption Standard (DES). By loading pairs of known plaintexts with onebit difference in the normal mode and then scanning out the internal state in the test mode, we first determine the position of all scan elements in the scan chain. Then, based on a systematic analysis of the structure of the nonlinear substitution boxes, and using three additional plaintexts we discover the DES secret key. Finally, some assumptions in the attack are discussed. 1.
PublicKey Cryptographic Processor for RSA and ECC
 Columbia University
, 2004
"... We describe a generalpurpose processor architecture for accelerating publickey computations on server systems that demand high performance and flexibility to accommodate large numbers of secure connections with heterogeneous clients that are likely to be limited in the set of cryptographic algorit ..."
Abstract

Cited by 8 (1 self)
 Add to MetaCart
We describe a generalpurpose processor architecture for accelerating publickey computations on server systems that demand high performance and flexibility to accommodate large numbers of secure connections with heterogeneous clients that are likely to be limited in the set of cryptographic algorithms supported. Flexibility is achieved in that the processor supports multiple publickey cryptosystems, namely RSA, DSA, DH, and ECC, arbitrary key sizes and, in the case of ECC, arbitrary curves over fields GF (p) and GF (2 m). At the core of the processor is a novel dualfield multiplier based on a modified carrysave adder (CSA) tree that supports both GF (p) and GF (2 m). In the case of a 64bit integer multiplier, the necessary modifications increase its size by a mere 5%. To efficiently schedule the multiplier, we implemented a multiplyaccumulate instruction that combines several steps of a multipleprecision multiplication in a single operation: multiplication, carry propagation, and partial product accumulation. We have developed a hardware prototype of the cryptographic processor in FPGA technology. If implemented in current 1.5 GHz processor technology, the processor executes 5,265 RSA1024 op/s and 25,756 ECC163 op/s the given key sizes offer comparable security strength. Looking at future security levels, performance is 786 op/s for RSA2048 and 9,576 op/s for ECC233. 1
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
 Proceedings of Topics in Cryptology  CTRSA 2004. Lecture Note in Computer Science
, 2004
"... Abstract. This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduced hardware accelerator features a design which can be varied from very small (less than 20 Kgates) targeting w ..."
Abstract

Cited by 7 (2 self)
 Add to MetaCart
Abstract. This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduced hardware accelerator features a design which can be varied from very small (less than 20 Kgates) targeting wireless applications, up to a very big design (more than 100 Kgates) used for network security. In latter option it can include a few dedicated large number arithmetic units each of which is a systolic array performing the Montgomery Modular Multiplication (MMM). The bound on the Montgomery parameter has been optimized to facilitate more secure ECC point operations. Furthermore, we present a new possibility for CRT scheme which is less vulnerable to sidechannel attacks.
Scalable and unified hardware to compute montgomery inverse
 in GF(p) and GF(2 n ),” Cryptographic Hardware and Embedded Systems  CHES 2002, 4th International Workshop
, 2003
"... Abstract. Computing the inverse of a number in finite fields GF(p) or GF(2 n) is equally important for cryptographic applications. This paper proposes a novel scalable and unified architecture for a Montgomery inverse hardware that operates in both GF(p) and GF(2 n) fields. We adjust and modify a GF ..."
Abstract

Cited by 7 (1 self)
 Add to MetaCart
Abstract. Computing the inverse of a number in finite fields GF(p) or GF(2 n) is equally important for cryptographic applications. This paper proposes a novel scalable and unified architecture for a Montgomery inverse hardware that operates in both GF(p) and GF(2 n) fields. We adjust and modify a GF(2 n) Montgomery inverse algorithm to accommodate multibit shifting hardware, making it very similar to a previously proposed GF(p) algorithm. The architecture is intended to be scalable, which allows the hardware to compute the inverse of long precision numbers in a repetitive way. After implementing this unified design it was compared with other designs. The unified hardware was found to be eight times smaller than another reconfigurable design, with comparable performance. Even though the unified design consumes slightly more area and it is slightly slower than the scalable inverter implementations for GF(p) only, it is a practical solution whenever arithmetic in the two finite fields is needed. 1