A performance evaluation of ARM ISA extension for elliptic curve cryptography over binary finite fields

被引:8
|
作者
Bartolini, S [1 ]
Branovic, I [1 ]
Giorgi, R [1 ]
Martinelli, E [1 ]
机构
[1] Univ Siena, Dept Informat Engn, I-53100 Siena, Italy
关键词
D O I
10.1109/SBAC-PAD.2004.5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an evaluation of possible ARM instruction set extension for Elliptic Curve Cryptography (ECC) over binary finite fields GF(2(m)). The use of elliptic curve cryptography is becoming common in embedded domain, where its reduced key size at a security level equivalent to standard public-key methods (such as RSA) allows for power consumption savings and more efficient operation. ARM processor was selected because it is widely used for embedded system applications. We developed an ECC benchmark set with three widely used public-key algorithms: Diffie-Hellman for key exchange, digital signature algorithm, as well as El-Gamal method for encryption/decryption. We analyzed the major bottlenecks at function level and evaluated the performance improvement, when we introduce some simple architectural support in the ARM ISA. Results of our experiments show that the use of a word-level multiplication instruction over binary field allows for an average 33% reduction of the total number of dynamically executed instructions, while execution time improves by the same amount when projective coordinates are used.
引用
收藏
页码:238 / 245
页数:8
相关论文
共 50 条
  • [1] High Performance FPGA Implementation of Elliptic Curve Cryptography over Binary Fields
    Liu, Shuai
    Ju, Lei
    Cai, Xiaojun
    Jia, Zhiping
    Zhang, Zhiyong
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 148 - 155
  • [2] Instruction set extension for fast elliptic curve cryptography over binary finite fields GF(2m)
    Grosschädl, J
    Kamendje, GA
    IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, PROCEEDINGS, 2003, : 455 - 468
  • [3] Software implementation of elliptic curve cryptography over binary fields
    Hankerson, D
    Hernandez, JL
    Menezes, A
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS, 2001, 1965 : 1 - 24
  • [4] A Comparative and Overview Analysis of Elliptic Curve Cryptography Over Finite Fields
    Prabu, M.
    Shanmugalakshmi, R.
    2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, : 495 - +
  • [5] Implementation of Pollard Rho Attack on Elliptic Curve Cryptography over Binary Fields
    Wienardo
    Yuliawan, Fajar
    Muchtadi-Alamsyah, Intan
    Rahardjo, Budi
    5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND NATURAL SCIENCES (ICMNS 2014), 2015, 1677
  • [6] Parallel architectures for elliptic curve cryptoprocessors over binary extension fields
    Antola, A
    Bertoni, G
    Breveglieri, L
    Maistri, P
    PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 802 - 805
  • [7] Construction of an elliptic curve over finite fields to combine with convolutional code for cryptography
    Ontiveros, B.
    Soto, I.
    Carrasco, R.
    IEE PROCEEDINGS-CIRCUITS DEVICES AND SYSTEMS, 2006, 153 (04): : 299 - 306
  • [8] Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields
    Seo, Hwajeong
    Liu, Zhe
    Choi, Jongseok
    Kim, Howon
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3121 - 3130
  • [9] Low latency elliptic curve cryptography accelerators for NIST curves over binary fields
    Shu, C
    Gaj, K
    Ei-Ghazawi, T
    FPT 05: 2005 IEEE INTERNATIONAL CONFERENCE ON FIELD PROGRAMMABLE TECHNOLOGY, PROCEEDINGS, 2005, : 309 - 310
  • [10] Elliptic curve cryptography over binary finite field GF(2m)
    Department of Physics, Eastern Mediterranean University, via Mersin 10, Gazimagusa, North Cyprus, Turkey
    Inf. Technol. J., 2006, 1 (204-229):