Elliptic curve cryptography (ECC) protocols due to higher security strength per bit have been widely accepted and deployed. Finite field multiplication is the most computational intensive operation in data security protocols developed using ECC. This paper presents two high-speed parallel re-configurable finite field multipliers: PIMD-2 and PIMD-3 over prime field (F p ) for ECC applications. The proposed designs are based on the new novel optimized interleaved multiplication algorithms. This work first identifies room of parallelism by investigating independent operations in the standard interleaved multiplication method and subsequently proposes high-speed hardware architectures that allow the parallel execution of these operations. Due to the introduced modifications, the critical path delays and clock cycle consumption in the PIMD-2 and PIMD-3 designs are reduced simultaneously. The proposed F p multipliers are synthesized using Xilinx ISE Design Suite and implemented on Virtex-5 and Virtex-6 field programmable gate array (FPGA) platforms for common ECC key sizes 160-521 bits. The implementation results reveal that the proposed designs are highly efficient, provided up to 3Â improvement in latency with lower area-delay product and higher throughput per FPGA slice as compared to the state-of-the-art.
K E Y W O R D Selliptic curve cryptography, field programmable gate array, finite field multiplication, hardware accelerators, public key cryptography
| INTRODUCTIONToday data security mechanism is essential in Internet of Things (IoTs) and must be developed considering computational power and resource availability of underlying systems. RSA 1 and elliptic curve cryptography (ECC) 2,3 are two popular public key (PK) schemes widely used for providing many interesting security protocols. [4][5][6] Different standardization bodies recommend ECC over RSA for deployment in the future. Different recommendations show that ECC key sizes are 10-30 times smaller than the traditional RSA scheme. 7 This key size gap is further expected to increase as the security challenges arise due to rapid advancement in the cryptanalysis techniques.RSA is an exponential scheme, and its implementation involves repeated finite field multiplication operation. On the other hand, ECC is structured on finite field addition, subtraction, multiplication, and inversion/division primitives. However, due to computational complexity of finite field inversion/division operations, different coordinate systems have been developed to avoid these operations at the cost of extra finite field multiplications. 5,8-10 Thus, a finite field