Journal on Communications ›› 2020, Vol. 41 ›› Issue (12): 100-109.doi: 10.11959/j.issn.1000-436X.2020226
• Papers • Previous Articles Next Articles
Bin YU, Hai HUANG, Zhiwei LIU, Shilei ZHAO, Ning NA
Revised:
2020-09-17
Online:
2020-12-25
Published:
2020-12-01
Supported by:
CLC Number:
Bin YU, Hai HUANG, Zhiwei LIU, Shilei ZHAO, Ning NA. Design and implementation of high-speed scalar multiplier for multi-elliptic curve[J]. Journal on Communications, 2020, 41(12): 100-109.
"
方案 | 曲线 | 工艺/nm | 主频/MHz | 门数/个 | 运算速度/(千次·秒-1) | 单次时间/μs | AT |
secp256r1(λG) | 384.8 | 2.60 | 2 657 | ||||
本文工作 | secp256r1(λP) | 55 | 625.00 | 1 022×103 | 152.5 | 6.56 | 6 704 |
Curve25519 | 157.9 | 6.33 | 6 469 | ||||
文献[4] | secp256r1 | 65 | 549.45 | 447×103 | 1.38 | 0.73 | 326 310 |
文献[5] | secp256r1 | 65 | 188.00 | 3.5×106 | 80 | 12.5 | 43 750 |
文献[6] | secp256r1 | 90 | 217.00 | 313×103 | 1.71 | 0.76 | 237 880 |
文献[7] | secp256r1 | 90 | 185.00 | 540×103 | 8.30 | 120 | 64 800 |
文献[25] | secp256r1 | 90 | 256.40 | 82.8×103 | 3.22 | 0.31 | 25 668 |
文献[26] | secp256r1 | 130 | 215.00 | 208×103 | 4.76 | 0.21 | 43 680 |
[1] | 姜久兴, 厚娇, 黄海 ,等. 低面积复杂度AES低熵掩码方案的研究[J]. 通信学报, 2019,40(5): 201-210. |
JIANG J X , HOU J , HUANG H ,et al. Research on area-efficient low-entropy masking scheme for AES[J]. Journal on Communications, 2019,40(5): 201-210. | |
[2] | RESCORLA E , MOZILLA . The transport layer security (TLS) protocol version 1.3:RFC8446[S]. IETF,(2018-08) [2020-03-07]. |
[3] | KUDITHI T , SAKTHIVEL R . High-performance ECC processor architecture design for IoT security applications[J]. Journal of Supercomputing, 2019,75(1): 447-474. |
[4] | HOSSAIN M S , KONG Y , SAEEDI E ,et al. High-performance elliptic curve cryptography processor over NIST prime fields[J]. IET Computers & Digital Techniques, 2017,11(1): 33-42. |
[5] | LIU J W , GUAN Z Y , CHENG D X ,et al. A high speed VLSI implementation of 256-bit scalar point multiplier for ECC over GF (p)[C]// 2018 IEEE International Conference on Intelligence and Safety for Robotics. Piscataway:IEEE Press, 2018: 184-191. |
[6] | LEE J W , CHUNG S C , CHANG H C ,et al. Efficient power-analysis-resistant dual-field elliptic curve cryptographic processor using heterogeneous dual-processing-element architecture[J]. IEEE Transactions on Very Large Scale Integration Systems, 2014,22(1): 49-61. |
[7] | CHUNG S C , LEE J W , CHANG H C ,et al. A high-performance elliptic curve cryptographic processor over GF(p) with SPA resistance[C]// IEEE International Symposium on Circuits and Systems. Piscataway:IEEE Press, 2012: 1456-1459. |
[8] | AL-SOMANI T F . High-performance generic-point parallel scalar multiplication[J]. Arabian Journal for Science and Engineering, 2017,42(2): 507-512. |
[9] | JAVEED K , WANG X , SCOTT M . High performance hardware support for elliptic curve cryptography over general prime field[J]. Microprocessors & Microsystems, 2017,51(6): 331-342. |
[10] | 王敏, 吴震 . 抗SPA 攻击的椭圆曲线NAF 标量乘实现算法[J]. 通信学报, 2012,33(Z1): 228-232. |
WANG M , WU Z . Algorithm of NAF scalar multiplication on ECC against SPA[J]. Journal on Communications, 2012,33(Z1): 228-232. | |
[11] | MOHAMED N , HASHIM M , HUTTER M . Improved fixed-base comb method for fast scalar multiplication[C]// Proceedings of the 5th International Conference on Cryptology. Berlin:Springer, 2012: 342-359. |
[12] | ZHANG N , CHEN Z , XIAO G . Efficient elliptic curve scalar multiplication algorithms resistant to power analysis[J]. Information Sciences, 2007,177(10): 2119-2129. |
[13] | 徐明, 史量 . 基于伪四维投射坐标的多基链标量乘法[J]. 通信学报, 2018,39(5): 74-84. |
XU M , SHI L . Pseudo 4D projective coordinate-based multi-base scalar multiplication[J]. Journal on Communications, 2018,39(5): 74-84. | |
[14] | IEEE Standards Association . IEEE standard specifications for public-key cryptography:IEEE Std 1363-2000[S]. IEEE,(2000-07) [2020-05-06]. |
[15] | LI W , ZENG X Y , FENG X . A high-throughput processor for dual-field elliptic curve cryptography with power analysis resistance[C]// 2015 IEEE 15th International Conference on Scalable Computing and Communications and Its Associated Workshops. Piscataway:IEEE Press, 2015: 570-577. |
[16] | COHEN H , MIYAJI A , ONO T . Efficient elliptic curve exponentiation using mixed coordinates[C]// International Conference on the Theory& Applications of Cryptology & Information Security:Advances in Cryptology. Berlin:Springer, 1998: 51-65. |
[17] | 王潮, 时向勇, 牛志华 . 基于蒙哥马利曲线改进 ECDSA 算法的研究[J]. 通信学报, 2010,31(1): 9-13. |
WANG C , SHI X Y , NIU Z H . The research of the promotion for ECDSA algorithm based on Montgomery-form ECC[J]. Journal on Communications, 2010,31(1): 9-13. | |
[18] | MARZOUQI H , AL-QUTAYRI M , SALAH K ,et al. A 65nm ASIC based 256 NIST prime field ECC processor[C]// 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2016. |
[19] | MARZOUQI H , AL-QUTAYRI M , SALAH K . Review of elliptic curve cryptography processor designs[J]. Microprocessors and Microsystems, 2015,39(2): 97-112. |
[20] | HANKERSON D , MENEZES A , VANSTONE S . Guide to elliptic curve cryptography[M]. Berlin: Springer, 2004. |
[21] | BERNSTEIN D , . CURVE25519:new Diffie-Hellman speed records[C]// International Workshop on Public Key Cryptography, Berlin:Springer, 2006: 207-228. |
[22] | LANGLEY A , GOOGLE , Hamburg M ,et al. Elliptic curves for Security:RFC7748[S]. IETF,(2016-01) [2020-01-21]. |
[23] | SALARIFARD R BAYAT-SARMADI S . An efficient low-latency point-multiplication over Curve25519[J]. IEEE Transactions on Circuits and Systems-I:Regular Papers, 2019,66(10): 3854-3862. |
[24] | DüELL M , HAASE B , HINTERWAELDER G ,et al. High-speed curve25519 on 8-bit,16-bit,and 32-bit microcontrollers[J]. Designs Codes & Cryptography, 2015,77(2-3): 493-514. |
[25] | CHEN Y L , LEE J W , LIU P C ,et al. A dual-field elliptic curve cryptographic processor with a radix-4 unified division unit[C]// IEEE International Symposium of Circuits and Systems. Piscataway:IEEE, 2011: 713-716. |
[26] | RASHIDI B . A survey on hardware implementations of elliptic curve cryptosystems[J]. arXiv Preprint,arXiv:1710.08336, 2017. |
[1] | Yiming XUE, Shurong LIU, Shuheng GUO, Yan LI, Cai’e HU. High-speed hardware architecture design and implementation of Ed25519 signature verification algorithm [J]. Journal on Communications, 2022, 43(3): 101-112. |
[2] |
Zhanpeng JIANG, Mingwei SUN, Hai HUANG, Jiang XU, Zhiwei LIU, Rui BAI, Zhou FANG, Jiaxing QU.
Research on |
[3] | Ming XU,Liang SHI. Pseudo 4D projective coordinate-based multi-base scalar multiplication [J]. Journal on Communications, 2018, 39(5): 74-84. |
[4] | Li-bing WU,Yong XIE,Yu-bo ZHANG. Efficient and secure message authentication scheme for VANET [J]. Journal on Communications, 2016, 37(11): 1-10. |
[5] | . Chosen message attacks method against ECC implementations [J]. Journal on Communications, 2014, 35(5): 11-87. |
[6] | Peng LUO,Hui-yun LI,Kun-peng WANG,Ya-wei WANG. Chosen message attacks method against ECC implementations [J]. Journal on Communications, 2014, 35(5): 79-87. |
[7] | Qian-nan LI,Yun-qiang LI,Shu-jing JIANG,Yao LU. Research on differential properties of Keccak-like nonlinear transform [J]. Journal on Communications, 2012, 33(9): 140-146. |
[8] | Chao WANG,Guang-yue HU,Huan-guo ZHANG. Lightweight security architecture design for wireless sensor network [J]. Journal on Communications, 2012, 33(2): 30-35. |
[9] | Chao WANG,Li-li LIU,Zhi-hua NIU,Xiang-yong SHI,Huan-guo ZHANG. Cryptography algorithm for wireless channel of CBTC system [J]. Journal on Communications, 2011, 32(2): 48-52. |
[10] | Xin-chun YIN,Hai-ling ZHANG,Ting YANG. Optimized fast multi-scalar multiplication algorithm based on MBNS [J]. Journal on Communications, 2010, 31(8A): 122-126. |
[11] | Chao WANG,Xiang-yong SHI,Zhi-hua NIU. The research of the promotion for ECDSA algorithm based on Montgomery-form ECC [J]. Journal on Communications, 2010, 31(1): 9-13. |
[12] | Hong WANG,Bao LI,Wei YU. Montgomery algorithm on elliptic curves over finite fields of character three [J]. Journal on Communications, 2008, 29(10): 25-29. |
[13] | Bao-hua ZHANG,Xin-chun YIN,Hai-ling ZHANG. EDSM:secure and efficient scalar multiplication algorithm on Edwards curves [J]. Journal on Communications, 2008, 29(10): 76-81. |
[14] | Fu-cai ZHOU,Long LIN,Jin-ying WANG,Jian XU. (t,n) threshold secret sharing scheme without SDC [J]. Journal on Communications, 2006, 27(10): 69-73. |
[15] | Chao CHEN,Xiao-yang ZENG,HANGQian-ling Z. A new hardware-reconfigurable public-key cryptographic coprocessor [J]. Journal on Communications, 2005, 26(1): 6-11. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|