Reconfigurable Architectures for Elliptic Curve and Pairing Based Cryptography


Book Description

The growing demand for cryptosystems on platforms ranging from large servers to mobile devices to smart cards has sparked research into low cost, exible and secure solutions to the problem. As constraints on architectures such as area, speed and power become key factors in choosing a cryptosystem, methods for speeding up the development and evaluation process are necessary. Elliptic curves, since their introduction to public key cryptography in 1985 have challenged established public key and signature generation schemes such as RSA, offering more security per bit. Within the elliptic curve domain itself, an engineer is met with a myriad of design choices. Beyond the choice of characteristic field, GF(2m), GF(3m) and GF(p), the choice of coordinate system, point scalar multiplication algorithm and processor configuration need to be considered. Evaluating new algorithms can require a significant amount of setup time and countless hours spent configuring state machines and ROM instructions. Through this work, a system for the quick and efficient generation and evaluation of a cryptosystem was developed. Developing cryptosystems tailored to a specific application is not the only constraint faced by a designer. Side channel attacks are an ever increasing risk with attacks exploiting tim- ing information, electromagnetic fields, fault injection and most recently, power analysis to break a system. These attacks are avoided by specially selecting algorithms used point scalar multiplication or modifying existing, vulnerable, methods. The methods used to prevent such attacks are discussed in relation to elliptic curve and pairing based cryptosystems.




Reconfigurable Computing: Architectures, Tools and Applications


Book Description

This book constitutes the proceedings of the 6th International Symposium on Reconfigurable Computing: Architectures, Tools and Applications, ARC 2010, held in Bangkok Thailand, in March 2010. The 42 papers presented, consisting of 26 full and 16 short papers, were carefully reviewed and selected from numerous submissions. The topics covered are practical applications of the RC technology, RC architectures, TC design methodologies and tools, and RC education.




Architectures for Cryptography Based on Elliptic Curves


Book Description

Elliptic curve cryptosystems (ECCs) currently offer more security per key bit than many other public key schemes. A class of related cryptosystems pairing based cryptosystems also based on elliptic curves allow identity based encryption where an arbitrary binary string represents a user{u2019}s public key. At the core of ECCs is the point multiplication operation, while pairing based cryptosystems rely on the efficient computation of a bilinear pairing operation. This thesis is concerned with novel algorithms and architectures for the hardware implementation of these core operations on an elliptic curve over an underlying Galois field. A new architecture for a Galois field arithmetic processor over GF (pm), p 2 is described based on the theory of Gröbner bases. A flexible ECC processor over GF(2m) is then detailed based on this processor capable of adapting to varying speed / security requirements on the fly. New algorithms and architectures for multiplication and inversion in GF(pm), p > 2 are discussed. In this thesis it is shown that, in certain cases ECC based cryptographic schemes over GF(pm), p > 2 will outperform their GF(2m) counterparts. The Tate pairing is implemented on supersingular elliptic curves over Galois fields of characteristic three. Algorithms for calculation of the Tate pairing are outlined and it is illustrated how this calculation can be efficiently performed in hardware. Two new hardware processors for Tate pairing calculation are described based on Galois field arithmetic over GF(3m).




Reconfigurable Computing: Architectures and Applications


Book Description

This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Reconfigurable Computing, ARC 2006, held in Delft, The Netherlands, in March 2006. The 22 revised full papers and 35 revised short papers presented were thoroughly reviewed and selected from 95 submissions. The papers are organized in topical sections on applications, power, image processing, organization and architecture, networks and communication, security, and tools.




Guide to Pairing-Based Cryptography


Book Description

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.




Reconfigurable Computing: Architectures, Tools and Applications


Book Description

This book constitutes the refereed proceedings of the Third International Workshop on Applied Reconfigurable Computing, ARC 2007, held in Mangaratiba, Brazil, in March 2007. The 27 full papers and 10 short papers presented together with a late-comer contribution from ARC 2006 are organized in topical sections on architectures, mapping techniques and tools, arithmetic, and applications.




Reconfigurable Elliptic Curve Cryptography


Book Description

"This work proposes a generic architecture for elliptic curve cryptosystem on a Field Programmable Gate Array (FPGA) that performs an elliptic curve scalar multiplication in 1.16 milliseconds for GF (2163), which is considerably faster than most other documented implementations. One of the benefits of the proposed processor architecture is that it is easily reprogrammable to use different algorithms and is adaptable to any field order. Also through reconfiguration the arithmetic unit can be optimized for different area/speed requirements. The mathematics involved uses binary extension field of the form GF (2n) as the underlying field and polynomial basis for the representation of the elements in the field. A significant gain in performance is obtained by using projective coordinates for the points on the curve during the computation process"--Abstract.




High-speed Elliptic Curve and Pairing-based Cryptography


Book Description

Elliptic Curve Cryptography (ECC), independently proposed by Miller [Mil86] and Koblitz [Kob87] in mid 80's, is finding momentum to consolidate its status as the public-key system of choice in a wide range of applications and to further expand this position to settings traditionally occupied by RSA and DL-based systems. The non-existence of known subexponential attacks on this cryptosystem directly translates to shorter keylengths for a given security level and, consequently, has led to implementations with better bandwidth usage, reduced power and memory requirements, and higher speeds. Moreover, the dramatic entry of pairing-based cryptosystems defined on elliptic curves at the beginning of the new millennium has opened the possibility of a plethora of innovative applications, solving in some cases longstanding problems in cryptography. Nevertheless, public-key cryptography (PKC) is still relatively expensive in comparison with its symmetric-key counterpart and it remains an open challenge to reduce further the computing cost of the most time-consuming PKC primitives to guarantee their adoption for secure communication in commercial and Internet-based applications. The latter is especially true for pairing computations. Thus, it is of paramount importance to research methods which permit the efficient realization of Elliptic Curve and Pairing-based Cryptography on the several new platforms and applications. This thesis deals with efficient methods and explicit formulas for computing elliptic curve scalar multiplication and pairings over fields of large prime characteristic with the objective of enabling the realization of software implementations at very high speeds. To achieve this main goal in the case of elliptic curves, we accomplish the following tasks: identify the elliptic curve settings with the fastest arithmetic; accelerate the precomputation stage in the scalar multiplication; study number representations and scalar multiplication algorithms for speeding up the evaluation stage; identify most efficient field arithmetic algorithms and optimize them; analyze the architecture of the targeted platforms for maximizing the performance of ECC operations; identify most efficient coordinate systems and optimize explicit formulas; and realize implementations on x86-64 processors with an optimal algorithmic selection among all studied cases. In the case of pairings, the following tasks are accomplished: accelerate tower and curve arithmetic; identify most efficient tower and field arithmetic algorithms and optimize them; identify the curve setting with the fastest arithmetic and optimize it; identify state-of-the-art techniques for the Miller loop and final exponentiation; and realize an implementation on x86-64 processors with optimal algorithmic selection.




Advances in Elliptic Curve Cryptography


Book Description

Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics. They are divided into the areas of protocols, implementation techniques, mathematical foundations and pairing based cryptography. Each of the topics is presented in an accessible, coherent and consistent manner for a wide audience that will include mathematicians, computer scientists and engineers.




Efficient Implementation Of Elliptic Curve Cryptography In Reconfigurable Hardware


Book Description

Elliptic curve cryptography (ECC) has emerged as a promising public-key cryptography approach for data protection. It is based on the algebraic structure of elliptic curves over finite fields. Although ECC provides high level of information security, it involves computationally intensive encryption/decryption process, which negatively affects its performance and energy-efficiency. Software implementation of ECC is often not amenable for resource-constrained embedded applications. Alternatively, hardware implementation of ECC has been investigated - in both application specific integrated circuit(ASIC) and field programmable gate array (FPGA) platforms - in order to achieve desired performance and energy efficiency. Hardware reconfigurable computing platforms such as FPGAs are particularly attractive platform for hardware acceleration of ECC for diverse applications, since they involve significantly less design cost and time than ASIC. In this work, we investigate efficient implementation of ECC in reconfigurable hardware platforms. In particular, we focus on implementing different ECC encryption algorithms in FPGA and a promising memory array based reconfigurable computing framework, referred to as MBC. MBC leverages the benefit of nanoscale memory, namely, high bandwidth, large density and small wire delay to drastically reduce the overhead of programmable interconnects. We evaluate the performance and energy efficiency of these platforms and compare those with a purely software implementation. We use the pseudo-random curve in the prime field and Koblitz curve in the binary field to do the ECC scalar multiplication operation. We perform functional validation with data that is recommended by NIST. Simulation results show that in general, MBC provides better energy efficiency than FPGA while FPGA provides better latency.