An end-to-end systems approach to elliptic curve cryptography

被引:0
|
作者
Gura, N [1 ]
Shantz, SC [1 ]
Eberle, H [1 ]
Gupta, S [1 ]
Gupta, V [1 ]
Finchelstein, D [1 ]
Goupy, E [1 ]
Stebila, D [1 ]
机构
[1] Sun Microsyst Labs, Palo Alto, CA USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolved into a mature public-key cryptosystem. Offering the smallest key size and the highest strength per bit, its computational efficiency can benefit both client devices and server machines. We have designed a programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF(2(m)). The accelerator is based on a scalable architecture capable of handling curves of arbitrary field degrees up to m = 255. In addition, it delivers optimized performance for a set of commonly used curves through hard-wired reduction logic. A prototype implementation running in a Xilinx XCV2000E FPGA at 66.4 MHz shows a performance of 6987 point multiplications per second for GF(2(163)). We have integrated ECC into OpenSSL, today's dominant implementation of the secure Internet protocol SSL, and tested it with the Apache web server and open-source web browsers.
引用
收藏
页码:349 / 365
页数:17
相关论文
共 50 条
  • [31] End-to-End Learning for Fair Ranking Systems
    Kotary, James
    Fioretto, Ferdinando
    Van Hentenryck, Pascal
    Zhu, Ziwei
    PROCEEDINGS OF THE ACM WEB CONFERENCE 2022 (WWW'22), 2022, : 3520 - 3530
  • [32] Key Technologies of End-to-End Reconfigurable Systems
    Liu, Y. L.
    Zeng, Z. M.
    Huo, Y. H.
    ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 1, 2008, : 660 - 666
  • [33] Business Models of End-to-End Reconfigurable Systems
    Bourse, Didier
    El-Khazen, Karim
    Lee, Al
    Boscovic, Dragan
    2006 IEEE 63RD VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 57 - +
  • [34] End-to-End Encryption for Personal Telehealth Systems
    Oellerer, Gerald
    Mense, Alexander
    PHEALTH 2014, 2014, 200 : 140 - 145
  • [35] End-to-end delay analysis for networked systems
    Jie Shen
    Wen-bo He
    Xue Liu
    Zhi-bo Wang
    Zhi Wang
    Jian-guo Yao
    Frontiers of Information Technology & Electronic Engineering, 2015, 16 : 732 - 743
  • [36] On Optimum End-to-End Distortion in MIMO Systems
    Chen, Jinhui
    Slock, Dirk T. M.
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2009,
  • [37] The end of end-to-end?
    Garfinkel, S
    TECHNOLOGY REVIEW, 2003, 106 (06) : 30 - 30
  • [38] End-to-end consensus using end-to-end channels
    Wiesmann, Matthias
    Defago, Xavier
    12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 341 - +
  • [39] A new approach to elliptic curve cryptography: An RNS architecture
    Schinianakis, D. M.
    Kakarountas, A. P.
    Stouraitis, T.
    CIRCUITS AND SYSTEMS FOR SIGNAL PROCESSING , INFORMATION AND COMMUNICATION TECHNOLOGIES, AND POWER SOURCES AND SYSTEMS, VOL 1 AND 2, PROCEEDINGS, 2006, : 1241 - 1245
  • [40] A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
    Wang, Chia-Hui
    Liu, Yu-Shun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (05) : 1545 - 1556