2019
DOI: 10.1142/s0218126619500373
|View full text |Cite
|
Sign up to set email alerts
|

MicroBlaze-Based Multiprocessor Embedded Cryptosystem on FPGA for Elliptic Curve Scalar Multiplication Over Fp

Abstract: In this paper, we present Microblaze-based parallel architectures of Elliptic Curve Scalar Multiplication (ECSM) computation for embedded Elliptic Curve Cryptosystem (ECC) on Xilinx FPGA. The proposed implementations support arbitrary Elliptic Curve (EC) forms defined over large prime field ([Formula: see text]) with different security-level sizes. ECSM is performed using Montgomery Power Ladder (MPL) algorithm in Chudnovsky projective coordinates system. At the low abstraction level, Montgomery Modular Multip… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…The literature is replete with parallelized schemes for Elliptic Curve Point Multiplier (ECPM) [24], [25], [26]. This is probably because researchers believe that the complexity of the Elliptic Curve Cryptosystem is mainly dependent on Elliptic Curve Scalar Multiplication (ECSM) [27]. Little or no attention has been given to how the ECC algorithm's entire operations involved in the encryption/decryption processes can be parallelized.…”
Section: Introductionmentioning
confidence: 99%
“…The literature is replete with parallelized schemes for Elliptic Curve Point Multiplier (ECPM) [24], [25], [26]. This is probably because researchers believe that the complexity of the Elliptic Curve Cryptosystem is mainly dependent on Elliptic Curve Scalar Multiplication (ECSM) [27]. Little or no attention has been given to how the ECC algorithm's entire operations involved in the encryption/decryption processes can be parallelized.…”
Section: Introductionmentioning
confidence: 99%
“…However, single core performance of a soft processor is usually poor, since soft processors go through the standard fetch-execute cycle for each instruction, and they cannot run at as high a clock rate as normal hard-core processors. For example, Xilinx Microblaze usually runs under 400 MHz, while Intel and ARM processors can run at well over 1 GHz [25][26][27][28][29].…”
Section: Soft Processorsmentioning
confidence: 99%
“…These computations are ensured by the MA(), MM() and MI() functions. In fact, MM is performed based on Montgomery radix-2 32 Modular Multiplication algorithm [27,43]. In the other hand, MI is executed by modular exponentiation (Mexp) according to Fermat's little theorem [7], as it is shown in Equation (7).…”
Section: Software Developmentmentioning
confidence: 99%
“…These algorithms are all combined to generate 384-bit TLS secret shared keys. The interest on ECCs [7] is justified by the fact that these systems provide better security with smaller key sizes when compared to the RSA method [27], and they are especially suitable for hardware implementation when binary fields are used [28].…”
Section: Introductionmentioning
confidence: 99%