Elliptic Curve Cryptography hardware accelerator for high-performance secure servers

被引:14
|
作者
Parrilla, Luis [1 ]
Alvarez-Bermejo, Jose A. [2 ]
Castillo, Encarnacion [1 ]
Lopez-Ramos, Juan A. [3 ]
Morales-Santos, Diego P. [1 ]
Garcia, Antonio [1 ]
机构
[1] Univ Granada, Dept Elect & Comp Technol, Granada, Spain
[2] Univ Almeria, Dept Informat, Almeria, Spain
[3] Univ Almeria, Dept Math, Almeria, Spain
来源
JOURNAL OF SUPERCOMPUTING | 2019年 / 75卷 / 03期
关键词
Elliptic Curve Cryptography; Hardware accelerator; Codesign; FPGA; MULTIPLICATION; IMPLEMENTATION; WIRELESS; GF(2(M));
D O I
10.1007/s11227-018-2317-6
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security threats affecting electronics communications in the current world make necessary the encryption and authentication of every transaction. The increasing levels of security required are leading to an overload of transaction servers due to cryptographic tasks. In this paper, a hardware-implemented coprocessor for Elliptic Curve Cryptography operations is presented. This coprocessor enables the acceleration of secure services and can be implemented in the last generations FPGA, thus allowing to host in the same chip a software secure web/database server and the cryptographic coprocessor. Obtained results show advantages of the proposed solution when compared to software implementations and classical acceleration using graphics processing units. Moreover, the proposed cryptographic coprocessor presents improvements over other hardware implementations when area, performance and scalability are considered. The developed crypto-processor has been implemented in a xc7z020clg484-1 device from Xilinx, taking advantage of the synergy provided by the ARM microprocessors and the programmable logic for hardware implementations included in the device. This design requires only 9852 LUTs, while providing 8930 scalar-point operations per second when operating at 50 MHz, with a power consumption of 0.42 W.
引用
收藏
页码:1107 / 1122
页数:16
相关论文
共 50 条
  • [31] Secure Data Access in Hadoop Using Elliptic Curve Cryptography
    Diaz, Antonio F.
    Blokhin, Ilia
    Ortega, Julio
    Palacios, Raul H.
    Rodriguez-Quintana, Cristina
    Diaz-Garcia, Juan
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2016 COLLOCATED WORKSHOPS, 2016, 10049 : 136 - 145
  • [32] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [33] A mathematic application on secure electronic transaction: Elliptic curve cryptography
    Huang, Po-Hsian
    Journal of Internet Technology, 2007, 8 (01): : 59 - 65
  • [34] Robust and Secure Image Steganography Based on Elliptic Curve Cryptography
    Ahmed, Diaa E. M.
    Khalifa, Othman O.
    2014 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2014, : 288 - 291
  • [35] A Secure Protocol for Bluetooth Piconets Using Elliptic Curve Cryptography
    Min-Shiang Hwang
    Cheng-Chi Lee
    Ji-Zhe Lee
    Chao-Chen Yang
    Telecommunication Systems, 2005, 29 : 165 - 180
  • [36] Secure and Efficient RNS software implementation for Elliptic Curve Cryptography
    Fournaris, Apostolos P.
    Papachristodoulou, Louiza
    Sklavos, Nicolas
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 86 - 93
  • [37] High-performance Pipelined FPGA Implementation of the Elliptic Curve Cryptography over GF (2n)
    Harb, Salah
    Ahmad, M. Omair
    Swamy, M. N. S.
    PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 15 - 24
  • [38] High-Performance FPGA Implementation of Modular Inversion over F256 for Elliptic Curve Cryptography
    Hossain, Md Selim
    Kong, Yinan
    2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, : 169 - 174
  • [39] Performance Evaluation of RSA and Elliptic Curve Cryptography
    Singh, Soram Ranbir
    Khan, Ajoy Kumar
    Singh, Soram Rakesh
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 302 - 306
  • [40] Elliptic Curve Cryptography Point Multiplication Core for Hardware Security Module
    Mehrabi, Mohamad Ali
    Doche, Christophe
    Jolfaei, Alireza
    IEEE TRANSACTIONS ON COMPUTERS, 2020, 69 (11) : 1707 - 1718