An end-to-end systems approach to elliptic curve cryptography

被引:0
|
作者
Gura, N [1 ]
Shantz, SC [1 ]
Eberle, H [1 ]
Gupta, S [1 ]
Gupta, V [1 ]
Finchelstein, D [1 ]
Goupy, E [1 ]
Stebila, D [1 ]
机构
[1] Sun Microsyst Labs, Palo Alto, CA USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolved into a mature public-key cryptosystem. Offering the smallest key size and the highest strength per bit, its computational efficiency can benefit both client devices and server machines. We have designed a programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF(2(m)). The accelerator is based on a scalable architecture capable of handling curves of arbitrary field degrees up to m = 255. In addition, it delivers optimized performance for a set of commonly used curves through hard-wired reduction logic. A prototype implementation running in a Xilinx XCV2000E FPGA at 66.4 MHz shows a performance of 6987 point multiplications per second for GF(2(163)). We have integrated ECC into OpenSSL, today's dominant implementation of the secure Internet protocol SSL, and tested it with the Apache web server and open-source web browsers.
引用
收藏
页码:349 / 365
页数:17
相关论文
共 50 条
  • [1] A Framework for end-to-end approach to Systems Integration
    Jain R.
    Chandrasekaran A.
    Erol O.
    International Journal of Industrial and Systems Engineering, 2010, 5 (01) : 79 - 109
  • [2] Validation approach for end-to-end reconfigurable systems
    Demestichas, Panagiotis
    Dimitrakopoulos, George
    Tsagkaris, Kostas
    Stavroulaki, Vera
    2007 PROCEEDINGS OF THE 16TH IST MOBILE AND WIRELESS COMMUNICATIONS, VOLS 1-3, 2007, : 379 - 383
  • [3] A New Approach to Elliptic Curve Cryptography
    Singh, L. Dolendro
    Debbarma, Tribid
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 78 - 82
  • [4] Hierarchical Identity Based Cryptography for End-to-End Security in DTNs
    Patra, Rabin
    Surana, Sonesh
    Nedevschi, Sergiu
    2008 IEEE 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2008, : 223 - 230
  • [5] An end-to-end cryptography based real-time chat
    Melo, Tiezer
    Barros, Antonio
    Antunes, Mario
    Frazao, Luis
    PROCEEDINGS OF 2021 16TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI'2021), 2021,
  • [6] AN END-TO-END APPROACH TO THE RESEQUENCING PROBLEM
    BACCELLI, F
    GELENBE, E
    PLATEAU, B
    JOURNAL OF THE ACM, 1984, 31 (03) : 474 - 485
  • [7] An approach to end-to-end system simulation
    Huynh, TV
    Titrud, HG
    1997 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOL 4, 1997, : 447 - 461
  • [8] End-to-end programmable computing systems
    Yao Xiao
    Guixiang Ma
    Nesreen K. Ahmed
    Mihai Capotă
    Theodore L. Willke
    Shahin Nazarian
    Paul Bogdan
    Communications Engineering, 2 (1):
  • [9] Elliptic curve cryptography on embedded multicore systems
    Junfeng Fan
    Kazuo Sakiyama
    Ingrid Verbauwhede
    Design Automation for Embedded Systems, 2008, 12 : 231 - 242
  • [10] Elliptic curve cryptography on embedded multicore systems
    Fan, Junfeng
    Sakiyama, Kazuo
    Verbauwhede, Ingrid
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2008, 12 (03) : 231 - 242