Elliptic curve cryptography (ECC) is an alternative to traditional techniques for public key cryptography. It offers smaller key size without sacrificing security level. Tate pairing is a bilinear map used in identity based cryptography schemes. In a typical elliptic curve cryptosystem, elliptic curve point multiplication is the most computationally expensive component. Similarly, Tate pairing is also quite computationally expensive. Therefore, it is more attractive to implement the ECC and Tate pairing using hardware than using software. The Cryptography is the most standard and efficient way to protect the security of web transactions. It can be used to protect the confidentiality, integrity, authentication, and non-reputation of the web transactions. There are two major categories of cryptography 1 schemes, i.e., public-key cryptography and symmetric-key cryptography. In public-key cryptography, the receiver and sender have their own private key and share a common public key. In symmetric-key cryptography, the receiver and sender must have the same private key, which makes it difficult to manage the private key. Public-key cryptography is easy for key distribution and key management. But it is not as efficient as symmetric-key cryptography [19,39]. Thus, it is interesting to use dedicated hardware for public-key cryptography to improve the performance.A well-known public-key cryptography algorithm is RSA, which was first proposed by and it is projected that its size will increase to 2048 bits after 2010. The performance issues of RSA with such a large key size will then become a dominant force, which can severely affect the performance of RSA. So, we would like to use 283-bit ECC in place of the 2048-bit RSA since it can significantly reduce the key length and still provides the same security level.Despite ECC's advantages over RSA, software based ECC implementations usually require long computation time, hence makes it difficult to be effectively utilized in real-time 2 The main contribution of our FPGA based design is the resources sharing and parallel processing optimization. The simulation results show that our implementation is significantly faster than the software implementation as well as previous FPGA implementations with the same security level [12, 27].
Tate PairingIdentity based cryptography schemes have opened a new territory for public key cryptography [8,38,42]. Using identity based cryptography schemes, a sender can derive the public key of a receiver without receiving the certificate of the receiver issued by a certificate authority (CA). The public key can be derived from the identity of the receiver such as the email or IP address. Pairing over elliptic curve can be used to construct the identity based cryptography schemes. It is a map from two points on the elliptic curve to another multiplicative group. It has special properties of bilinearity. Currently, the most commonly used pairing methods are Tate pairing [13] and Weil pairing [31]. Originally, Weil pairing was used to attack publi...