FPGA based hardware acceleration for elliptic curve public key cryptosystems

被引:9
|
作者
Ernst, M [1 ]
Henhapl, B [1 ]
Klupsch, S [1 ]
Huss, S [1 ]
机构
[1] Tech Univ Darmstadt, Integrated Circuits & Syst Lab, D-64283 Darmstadt, Germany
关键词
public key cryptography; VHDL model generator; co-processor synthesis; FPGA-based hardware acceleration; ECDSA; !text type='Java']Java[!/text; JCA;
D O I
10.1016/S0164-1212(03)00075-X
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper addresses public key cryptosystems based on elliptic curves, which are aimed to high-performance digital signature schemes. Elliptic curve algorithms are characterized by the fact that one can work with considerably shorter keys compared to the RSA approach at the same level of security. A general and highly efficient method for mapping the most time-critical operations to a configurable co-processor is proposed. By means of real-time measurements the resulting performance values are compared to previously published state of the art hardware implementations. A generator based approach is advocated for that purpose which supports application specific co-processor configurations in a flexible and straight forward way. Such a configurable CryptoProcessor has been integrated into a Java-based digital signature environment resulting in a considerable increase of its performance. The outlined approach combines in an unique way the advantages of mapping functionality to either hardware or software and it results in high-speed cryptosystems which are both portable and easy to update according to future security requirements. (C) 2003 Elsevier Inc. All rights reserved.
引用
收藏
页码:299 / 313
页数:15
相关论文
共 50 条
  • [41] Reconfigurable elliptic curve cryptosystems on a chip
    Cheung, RCC
    Luk, W
    Cheung, PYK
    [J]. DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2005, : 24 - 29
  • [42] On efficient implementation of FPGA-based hyperelliptic curve cryptosystems
    Elias, Grace
    Miri, Ali
    Yeap, Tet-Hin
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (5-6) : 349 - 366
  • [43] Kleptographic Attacks on Elliptic Curve Cryptosystems
    Mohamed, Elsayed
    Elkamchouchi, Hassan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (06): : 213 - 215
  • [44] Elliptic Curve Cryptosystems and Scalar Multiplication
    Constantinescu, Nicolae
    [J]. ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (01): : 27 - 34
  • [45] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, AE
    Ei-Shennawy, K
    [J]. 35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 213 - 222
  • [46] Secure and Compact Elliptic Curve Cryptosystems
    Jin, Yaoan
    Miyaji, Atsuko
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 639 - 650
  • [47] Elliptic curve cryptosystems on smart cards
    Mohammed, E
    Emarah, A
    Ei-Shennawy, K
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 311 - 322
  • [48] NON-SUPERSINGULAR ELLIPTIC-CURVES FOR PUBLIC KEY CRYPTOSYSTEMS
    BETH, T
    SCHAEFER, F
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 316 - 327
  • [49] Scan-Based Attack against Elliptic Curve Cryptosystems
    Nara, Ryuta
    Togawa, Nozomu
    Yanagisawa, Masao
    Ohtsuki, Tatsuo
    [J]. 2010 15TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE (ASP-DAC 2010), 2010, : 402 - 407
  • [50] Faster attacks on elliptic curve cryptosystems
    Wiener, MJ
    Zuccherato, RJ
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 190 - 200