期刊文献+

一种可配置的椭圆曲线密码加速器

A configurable accelerator of elliptic curve cryptography
下载PDF
导出
摘要 提出了一种可配置的椭圆曲线密码(ECC)加速器,它支持8个特征为2的有限域GF(2m)中的ECC标量乘运算,曲线参数和不可约多项式可以任意选择.加速器采用标准的运算单元,设计了能消除数据相关性的内部指令生成器,采用了独特的流水线设计,具有良好的灵活性和可扩展性.基于该体系架构,分析了m分别为113,131,163,193,233,283,409,571时实现标量乘运算所需要的时间.取m=163时,与其它类似设计的比较结果表明,该加速器性能优越,具有良好的应用前景. A configurable Elliptic Curve Cryptography(ECC) accelerator was proposed,which could complete scalar multiplication fast.It supported eight fields over characteristic 2 finite fields,which were recommended by some standards and were widely adopted.The irreducible polynomial and other Elliptic Curve parameters could be selected free.The accelerator applied with regular arithmetic unit.An internal instruction generator was designed to control the calculation,which avoided data dependency through smart schedule.A special pipeline was introduced to get high performance.It owned good flexibility and expansibility.Based on this architecture,the time consumed by completing scalar multiplication was analyzed,in allusion to m=113,131,163,193,233,283,409 and 571 respectively.When m=163,the comparison results with other similar kinds of design showed that it owned advanced speed performance and had good application prospects.
机构地区 浙江传媒学院
出处 《浙江大学学报(理学版)》 CAS CSCD 北大核心 2011年第1期46-49,共4页 Journal of Zhejiang University(Science Edition)
关键词 椭圆曲线密码 射影Montgomery标量乘算法 特征为2的有限域 elliptic curve cryptography projective Montgomery scalar multiplication characteristic 2 finite filed
  • 相关文献

参考文献8

  • 1BARKER E, BARKER W. Special Publication 800- 57: Recommendation for Key Management[S]. National Institute of Standards and Technology,2007.
  • 2HANKERSON D, LOPEZ J, MENEZES A. Software implementation of elliptic curve cryptography over binary fields[C]//Proeeeflings of the Second International Workshop on Cryptographie Hardware and Embedded Systems. London, UK : Springer Verlag, 2000 : 1 - 24.
  • 3沈海斌,陈华锋,严晓浪.椭圆曲线密码加速器的设计实现[J].浙江大学学报(工学版),2006,40(9):1490-1493. 被引量:5
  • 4SATOH A, TAKANO K. A scalable dual-field elliptic curve cryptographic processo [J]. IEEE Transactions on Computers, 2003,52 (4) 449 - 460.
  • 5AGNEW G, MULLIN R, ONYSZCHUK I, et ah An implementation of elliptic curve cryptosystems over F (2^155)[J]. IEEE J Selected Areas Comm, 1993,11 (7):804-813.
  • 6ERNST M, KLUPSCH S, HAUCK O, et al. Rapid prototyping for hardware accelerated elliptic curve public-key cryptosystems[C]//Proe,11th Int'l Workshop Rapid System Prototyping(RSP 2001). Monterey, USA: IEEE,2001:24-29.
  • 7ROSNER M C. Elliptic Curve Cryptosystems on Reconfigurable Hardware [D]. Master's thesis, Worcester Polytechnic Institute, MA, USA,1998.
  • 8OKADA S, TORII N, ITOH K, et al. Implementation of elliptic curve cryptographic coprocessor over GF (2^m) on an FPGA[C]//Proc. Cryptographic Hardware and Embedded Systems ( CHES2000 ). MA, USA: Springer Berlin, 2000 : 25 - 40.

二级参考文献8

  • 1MILLER V S.Use of elliptic curves in cryptography[C]∥Advances in Cryptology-CRYPTO '85 Proceedings.London,UK:Springer Verlag,1986:417-426.
  • 2HANKERSON D,LOPEZ J,MENEZES A.Software implementation of elliptic curve cryptography over binary fields[C]∥Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems.London,UK:Springer Verlag,2000:1-24.
  • 3LOPEZ J.DAHAB R.Fast multiplication on elliptic curves over GF(2m) without precomputation[C]∥Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems.London,UK:Springer Verlag,1999:316-327.
  • 4JORGE G,CHRISTOF P.Itoh-Tsujii inversion in standard basis and its application in cryptography and codes[J].Designs,Codes and Cryptography,2001,25:207-216.
  • 5SATOH A,TAKANO K.A scalable dual-field elliptic curve cryptographic processor[J].IEEE Transactions on Computers,2003,52(4):449-460.
  • 6ERNST M,KLUPSCH S,HAUCK O,et al.Rapid prototyping for hardware accelerated elliptic curve public-key cryptosystems[C]∥ 12th IEEE Workshop on Rapid System Prototyping.[S.l.]:IEEE,2001:24-29.
  • 7OKADA S,TORII N,ITOH K,et al.Implementation of elliptic curve cryptographic coprocessor over GF(2m) on an FPGA[C]∥ Proceedings on Cryptographic Hardware and Embedded Systems.[S.l.]:IEEE,2000:25-40.
  • 8唐薛峰,沈海斌,严晓浪.GF(2^m)上椭圆曲线密码体制的硬件实现[J].计算机工程与应用,2004,40(11):96-98. 被引量:3

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部