Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(199.66KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Remodeling of Elliptic Curve Cryptography Scalar Multiplication Architecture using Parallel Jacobian Coordinate System
Adnan Abdul-Aziz Gutub
Pages - 409 - 425     |    Revised - 30-08-2010     |    Published - 30-10-2010
Volume - 4   Issue - 4    |    Publication Date - October 2010  Table of Contents
MORE INFORMATION
KEYWORDS
Cryptography hardware, Elliptic curve cryptography, Jacobian coordinate system, Parallel multipliers architecture, Projective coordinate cryptosystems
ABSTRACT
In this paper, an improved parallel elliptic curve processor is designed and modeled. We adjusted the Jacobian coordinates system by interacting point double and point add operations. This modified coordinates is parallelized using four multipliers similar to older parallel architectures. We implemented the components of the proposed design using FPGA with parametric features, in terms of number of parallel multipliers, number of parallel adders and width of input operands. The remodeled design is compared to other similar designs i.e. parallel Jacobian coordinates and parallel standard projective coordinates yielding better performance. Results showed that this proposed modified Jacobian design gave higher speed and cost (AT2) showing attractive research direction.
CITED BY (9)  
1 Kulkarni, A., & Jagtap, S. V. Email encryption based on elliptic curve cryptography for Android mobile devices.
2 Bhatta, J., & Pandey, L. P. (2015, December). Performance analysis of various optimization techniques for elliptic curve cryptosystems on resource-constrained devices. In 2015 9th International Conference on Software, Knowledge, Information Management and Applications (SKIMA) (pp. 1-7). IEEE.
3 Anagreh, M., Samsudin, A., & Omar, M. A. (2014). Parallel Method for Computing Elliptic Curve Scalar Multiplication Based on MOF. International Arab Journal of Information Technology (IAJIT), 11(6).
4 Kodali, R. K., & Boppana, L. (2014, September). FPGA implementation of energy efficient multiplication over GF (2 m) for ECC. In Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on (pp. 1815-1821). IEEE.
5 Kodali, R. K., Patel, K. H., & Sarma, N. N. (2013). Implementation of Energy Efficient Scalar Point Multiplication Techniques for ECC. International Journal on Recent Trends in Engineering & Technology, 9(1), 14.
6 Zele, A. P., & Wadhe, A. P. Comparatively Study of ECC and Jacobian Elliptic Curve Cryptography.
7 Kodali, R. K., Patel, K. H., & Sarma, N. (2013, February). Energy efficient elliptic curve point multiplication for WSN applications. In Communications (NCC), 2013 National Conference on (pp. 1-5). IEEE.
8 Thilagavathi, K., & Rajeswari, P. G. (2012). Efficiency and Effectiveness Analysis over ECC-Based Direct and Indirect Authentication Protocols: An Extensive Comparative Study. ICTACT Journal on Communication Technology, 3(1), 515-524.
9 NaseimoDaikpor, M., & Adegbenro, O. (2011, December). Concurrent realization of the multiply-by-7 Elliptic Curve Scalar Multiplication algorithm. In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for (pp. 797-804). IEEE.
1 Google Scholar 
2 Academic Journals Database 
3 Academic Index 
4 CiteSeerX 
5 refSeek 
6 iSEEK 
7 Socol@r  
8 ResearchGATE 
9 Libsearch 
10 Bielefeld Academic Search Engine (BASE) 
11 Scribd 
12 SlideShare 
13 PDFCAST 
14 PdfSR 
1 N. Koblitz, "Elliptic curve cryptosystems", In Mathematics of Computation, volume 48, pages 203–209, 1987.
2 V. Miller, "Use of elliptic curves in cryptography", Advances in Cryptology—CRYPTO'85, Vol. 218 of Lecture Notes in Computer Science, pages 417–426. Springer-Verlag, 1986.
3 J.H. Cheon, H.J. Kim, S.G. Hahn, "Elliptic curve discrete logarithm and integer factorization", The Math Net Korea, Information Center for Mathematical Sciences (ICMS), February 7, 1999, http://mathnet.kaist.ac.kr/
4 A Certicom Whitepaper, "The Elliptic Curve Cryptosystem", July 2000, http://www.certicom.com/
5 Hitchcock, Yvonne Roslyn, "Elliptic Curve Cryptography for Lightweight Applications", Institution Queensland University of Technology, 2003. http://adt.library.qut.edu.au/adtqut/ public/adt-QUT20040723.150510/
6 Naoya Torii and Kazuhiro Yokoyama, "Elliptic Curve Cryptosystem", FUJITSU Sci. Tech. Journal, Vol. 36, No. 2, pages 140-146, December 2000. www.fujitsu.com/downloads/MAG/vol36-2/paper05.pdf
7 O. Al-Khaleel, C. Papachristou, F. Wolff, K. Pekmestzi, "An Elliptic Curve Cryptosystem Design Based on FPGA Pipeline Folding", 13th IEEE International On-Line Testing Symposium, IOLTS 07, pages 71 – 78, 8-11 July 2007.
8 A.J. Menezes, T. Okamoto, S.A. Vanstone, S, "Reducing elliptic curve logarithms to logarithms in a finite field", IEEE Transactions on Information Theory, Volume 39, Issue 5, pages 1639 – 1646, Sept. 1993.
9 T. Hasegawa, J. Nakajima, M. Matsui, "A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer", In Public Key Cryptography – PKC ’98, Proceedings, volume 1431 of Lecture Notes in Computer Science, pages 182–194, Springer- Verlag, 1998.
10 Scott Vanstone, "Crypto Column: The Importance of Good Crypto and Security Standards", Code & Cipher- Certicom's Bulletin of Security and Cryptography, Volume 1, Issue 4, 2004, http://www.certicom.com/codeandcipher
11 A. Daly, W. Marnane, "Efficient Architectures for implementing Montgomery Modular Multiplication and RSA Modular Exponentiation on Reconfigurable Logic", Proceedings of the ACM/SIGDA tenth international symposium on Field-programmable gate arrays, pages: 40 - 49, Monterey, California, USA, 2002
12 G.B. Agnew, R.C. Mullin, S.A. Vanstone, "An implementation of elliptic curve cryptosystems over F2155", IEEE Journal on Selected Areas in Communications, Volume 11, Issue 5, pages 804 – 813, June 1993
13 Martin Christopher Rosner, "Elliptic Curve Cryptosystems on Reconfigurable Hardware", MS Thesis submitted to Electrical Engineering in Worcester Polytecnic Institute, U.S.A., 1998.
14 I. Blake, G. Seroussi, N.P. Smart., “Elliptic Curves in Cryptography”, London Mathematical Society, Lecture Note Series. Cambridge University Press, 1999.
15 M. Bednara, M. Daldrup, J. Teich, J. von zur Gathen, J. Shokrollahi, "Tradeoff analysis of FPGA based elliptic curve cryptography", IEEE International Symposium on Circuits and Systems, ISCAS 2002, Vol. 5, pages 797 – 800, 26-29 May 2002.
16 N.A. Saqib, F. Rodriguez-Henriquez, A. Diaz-Perez, "A Parallel Architecture for Computing Scalar Multiplication on Hessian Elliptic Curves", International Conference on Information Technology: Coding and Computing (ITCC'04), Vol. 2, pages 546–552, Las Vegas, NV, USA, 2004.
17 Z. Dyka, P. Langendoerfer, "Area efficient hardware implementation of elliptic curve cryptography by iteratively applying Karatsuba's method", Proceedings of Conference on Design, Automation and Test in Europe, pages 70 – 75, 2005.
18 T.F. Al-Somani, M.K. Ibrahim, "High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks", International Journal of Computer Science and Network Security - IJCSNS, Vol. 6, No.1B, pages 177-183, January 2006.
19 T.F. Al-Somani, M. Ibrahim, A. Gutub, "Highly Efficient Elliptic Curve Crypto-Processor with Parallel GF(2m) Field Multipliers", Journal of Computer Science (JCS), Vol. 2, No 5, pages 395-400, 2006.
20 J. Fan, K. Sakiyama, I. Verbauwhede, "Elliptic Curve Cryptography on Embedded Multicore Systems," Workshop on Embedded Systems Security - WESS, pages 17-22, 2007. http://www.cosic.esat.kuleuven.be/publications/article-937.pdf
21 G. Orlando, C. Paar, "A scalable GF(p) elliptic curve processor architecture for programmable hardware", Third International Workshop on Cryptographic Hardware and Embedded Systems - CHES, pages 348-363, Paris, France, 14-16 May 2001.
22 G. Orlando, "Efficient Elliptic Curve Processor Architectures for Field Programmable Logic", Ph.D. Thesis, Worcester Polytechnic Institute, March 2002.
23 S.B. Ors, L. Batina, B. Preneel, J. Vandewalle, "Hardware implementation of an elliptic curve processor over GF(p)", IEEE International Conference on Application-Specific Systems, Architectures, and Processors, pages 433 – 443, 24-26 June 2003.
24 A. Gutub, M.K. Ibrahim, "High Radix Parallel Architecture For GF(p) Elliptic Curve Processor", IEEE Conference on Acoustics, Speech, and Signal Processing - ICASSP 2003, pages 625- 628, Hong Kong, April 6-10, 2003.
25 B. Ansari, Huapeng Wu,"Parallel scalar multiplication for elliptic curve cryptosystems", International Conference on Communications, Circuits and Systems, Vol. 1, pages 71-73, 27-30 May 2005.
26 F. Sozzani, G. Bertoni, S. Turcato, L. Breveglieri, "A parallelized design for an elliptic curve cryptosystem coprocessor", International Conference on Information Technology: Coding and Computing - ITCC 2005, Vol. 1, pages 626 – 630, 4-6 April 2005.
27 Jun-Hong Chen, Ming-Der Shieh, Chien-Ming Wu,"Concurrent algorithm for high-speed point multiplication in elliptic curve cryptography", IEEE International Symposium on Circuits and Systems - ISCAS, pages 5254 – 5257, 23-26 May 2005.
28 S. Moon, J. Park, and Y. Lee, "Fast VLSI Algorithms for High-security Elliptic Curve Cryptographic Application", IEEE Trans. on Consumer Electronics, Vol. 47, No. 3, pages 700-708, 2001.
29 P.M. Mishra,"Pipelined computation of scalar multiplication in elliptic curve cryptosystems (extended version)", IEEE Transactions on Computers, Vol. 55, No. 8, pages 1000 – 1010, Aug. 2006.
30 W.N. Chelton, M. Benaissa, "Fast Elliptic Curve Cryptography on FPGA", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 16, No. 2, pages 198-205, Feb. 2008.
31 W. Chelton, M. Benaissa, “High-speed pipelined ECC processor on FPGA”, IEEE Workshop Signal Process. Syst. (SiPS), pages 136-141, Banff, Canada, 2006.
32 P. Longa, A. Miri, "Fast and Flexible Elliptic Curve Point Arithmetic over Prime Fields", IEEE Transactions on Computers, Vol. 57 , No. 3, pages 289-302, March 2008.
33 M.S. Anoop, "Elliptic Curve Cryptography, An Implementation Guide", online Implementation Tutorial, Tata Elxsi, India, 5 January 2007 http://www.infosecwriters.com/text_resources/pdf/Elliptic_Curve_AnnopMS.pdf
34 D. Hankerson, A. Menezes, S. Vanstone, “Guide to Elliptic Curve Cryptography”, Springer- Verlag, ISBN 0-387-95273-X, 2004.
Dr. Adnan Abdul-Aziz Gutub
Umm Al-Qura University - Saudi Arabia
adnangutub@gmail.com