高效能橢圓曲線密碼架構之設計

碩士 === 國立清華大學 === 資訊工程學系 === 97 === Elliptic curve cryptography (ECC), a public-key cryptography, has raised much interests and attentions recently. Compared with RSA, ECC has short key length but provides the same security level as RSA. With this property, ECC is more suitable for the small and por...

Full description

Bibliographic Details
Main Authors: Yang, Kai-Hsiang, 楊凱翔
Other Authors: Huang, Chih-Tsun
Format: Others
Language:en_US
Online Access:http://ndltd.ncl.edu.tw/handle/88616034885897233614
id ndltd-TW-097NTHU5392150
record_format oai_dc
spelling ndltd-TW-097NTHU53921502015-11-13T04:08:49Z http://ndltd.ncl.edu.tw/handle/88616034885897233614 高效能橢圓曲線密碼架構之設計 High-PerformanceArchitectureforEllipticCurveCryptographyoverBinaryField Yang, Kai-Hsiang 楊凱翔 碩士 國立清華大學 資訊工程學系 97 Elliptic curve cryptography (ECC), a public-key cryptography, has raised much interests and attentions recently. Compared with RSA, ECC has short key length but provides the same security level as RSA. With this property, ECC is more suitable for the small and portable devices. Because the short key length reduces the storage and transmission power. In our approach, we try to accelerate the performance of scalar multiplication, which is an important point operation in ECC. Based on the Montgomery ladder method over binary field GF(2n), we address the operation scheduling results for different number of Arithmetic Units (AUs) with optimized amount of registers during the scalar multiplication. In order to do the modular reduction over GF(2163), we derive the closed form equations for pentanomial bit-parallel reduction. The AU is for the basic finite field operations, such as field multiplication, field squaring, and field addition. The multiplication inside the AU and the data transmission are well scheduled to speed up the critical operation effectively. Multipliers with various word lengths are designed and evaluated in terms of performance and area. The smaller word length makes the multiplier smaller but introduces more extra cycles, and vice versa. We also present an ECC core with different numbers of AU for the scalar multiplication. The implementation result with TSMC 0.13μm CMOS technology shows that we can perform a scalar multiplication in 20.9μs and 11.1μs with one-AU and three-AU ECC cores over GF(2163), respectively. At the last, the AT comparison between our approach and related works also shows that our approach is better than others. Huang, Chih-Tsun 黃稚存 學位論文 ; thesis 65 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立清華大學 === 資訊工程學系 === 97 === Elliptic curve cryptography (ECC), a public-key cryptography, has raised much interests and attentions recently. Compared with RSA, ECC has short key length but provides the same security level as RSA. With this property, ECC is more suitable for the small and portable devices. Because the short key length reduces the storage and transmission power. In our approach, we try to accelerate the performance of scalar multiplication, which is an important point operation in ECC. Based on the Montgomery ladder method over binary field GF(2n), we address the operation scheduling results for different number of Arithmetic Units (AUs) with optimized amount of registers during the scalar multiplication. In order to do the modular reduction over GF(2163), we derive the closed form equations for pentanomial bit-parallel reduction. The AU is for the basic finite field operations, such as field multiplication, field squaring, and field addition. The multiplication inside the AU and the data transmission are well scheduled to speed up the critical operation effectively. Multipliers with various word lengths are designed and evaluated in terms of performance and area. The smaller word length makes the multiplier smaller but introduces more extra cycles, and vice versa. We also present an ECC core with different numbers of AU for the scalar multiplication. The implementation result with TSMC 0.13μm CMOS technology shows that we can perform a scalar multiplication in 20.9μs and 11.1μs with one-AU and three-AU ECC cores over GF(2163), respectively. At the last, the AT comparison between our approach and related works also shows that our approach is better than others.
author2 Huang, Chih-Tsun
author_facet Huang, Chih-Tsun
Yang, Kai-Hsiang
楊凱翔
author Yang, Kai-Hsiang
楊凱翔
spellingShingle Yang, Kai-Hsiang
楊凱翔
高效能橢圓曲線密碼架構之設計
author_sort Yang, Kai-Hsiang
title 高效能橢圓曲線密碼架構之設計
title_short 高效能橢圓曲線密碼架構之設計
title_full 高效能橢圓曲線密碼架構之設計
title_fullStr 高效能橢圓曲線密碼架構之設計
title_full_unstemmed 高效能橢圓曲線密碼架構之設計
title_sort 高效能橢圓曲線密碼架構之設計
url http://ndltd.ncl.edu.tw/handle/88616034885897233614
work_keys_str_mv AT yangkaihsiang gāoxiàonéngtuǒyuánqūxiànmìmǎjiàgòuzhīshèjì
AT yángkǎixiáng gāoxiàonéngtuǒyuánqūxiànmìmǎjiàgòuzhīshèjì
AT yangkaihsiang highperformancearchitectureforellipticcurvecryptographyoverbinaryfield
AT yángkǎixiáng highperformancearchitectureforellipticcurvecryptographyoverbinaryfield
_version_ 1718128356350754816