FPGA based hardware acceleration for elliptic curve public key cryptosystems

被引:9
|
作者
Ernst, M [1 ]
Henhapl, B [1 ]
Klupsch, S [1 ]
Huss, S [1 ]
机构
[1] Tech Univ Darmstadt, Integrated Circuits & Syst Lab, D-64283 Darmstadt, Germany
关键词
public key cryptography; VHDL model generator; co-processor synthesis; FPGA-based hardware acceleration; ECDSA; !text type='Java']Java[!/text; JCA;
D O I
10.1016/S0164-1212(03)00075-X
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper addresses public key cryptosystems based on elliptic curves, which are aimed to high-performance digital signature schemes. Elliptic curve algorithms are characterized by the fact that one can work with considerably shorter keys compared to the RSA approach at the same level of security. A general and highly efficient method for mapping the most time-critical operations to a configurable co-processor is proposed. By means of real-time measurements the resulting performance values are compared to previously published state of the art hardware implementations. A generator based approach is advocated for that purpose which supports application specific co-processor configurations in a flexible and straight forward way. Such a configurable CryptoProcessor has been integrated into a Java-based digital signature environment resulting in a considerable increase of its performance. The outlined approach combines in an unique way the advantages of mapping functionality to either hardware or software and it results in high-speed cryptosystems which are both portable and easy to update according to future security requirements. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:299 / 313
页数:15
相关论文
共 50 条
  • [31] High-speed hardware architecture of scalar multiplication for binary elliptic curve cryptosystems
    Rashidi, Bahram
    Sayedi, Sayed Masoud
    Farashahi, Reza Rezaeian
    [J]. MICROELECTRONICS JOURNAL, 2016, 52 : 49 - 65
  • [32] Reconfigurable elliptic curve cryptosystems on a chip
    Cheung, RCC
    Luk, W
    Cheung, PYK
    [J]. DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2005, : 24 - 29
  • [33] Elliptic Curve Cryptosystems in the Presence of Faults
    Joye, Marc
    [J]. 2013 10TH WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2013), 2013, : 73 - 73
  • [34] A systolic architecture for elliptic curve cryptosystems
    Tsai, WC
    Wang, SJ
    [J]. 2000 5TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS I-III, 2000, : 591 - 597
  • [35] Efficient algorithms for elliptic curve cryptosystems
    Guajardo, J
    Paar, C
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 342 - 356
  • [36] Key Generation in Elliptic Curve Cryptosystems over GF(2n)
    Lee, Tai-Chi
    [J]. INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, IMECS 2012, VOL I, 2012, : 326 - 331
  • [37] Modulus search for elliptic curve cryptosystems
    Koyama, K
    Tsuruoka, Y
    Kunihiro, N
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT'99, PROCEEDINGS, 1999, 1716 : 1 - 7
  • [38] Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems
    Gutub, Adnan Abdul-Aziz
    Khan, Farhan Abdul-Aziz
    [J]. 2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, : 116 - 121
  • [39] Kleptographic Attacks on Elliptic Curve Cryptosystems
    Mohamed, Elsayed
    Elkamchouchi, Hassan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 213 - 215
  • [40] Faster attacks on elliptic curve cryptosystems
    Wiener, MJ
    Zuccherato, RJ
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 190 - 200