Proposed unified 32-bit multiplier/inverter for asymmetric cryptography

Anissa Sghaier, M. Zeghid, Chiraz Massoud, Mohsen Machhout
{"title":"Proposed unified 32-bit multiplier/inverter for asymmetric cryptography","authors":"Anissa Sghaier, M. Zeghid, Chiraz Massoud, Mohsen Machhout","doi":"10.1109/DT.2017.8012085","DOIUrl":null,"url":null,"abstract":"Arithmetic in GF(2n) finite fields in asymmetric cryptography is the key of an efficient cryptosystems implementation. Thus, cryptosystems based on algebraic curves such as Hyper/Elliptic curves (ECC,HECC) and Pairings need a big number of arithmetic operations. They required several GF(2n) inversions and multiplications which are the most time and area consuming operations. This paper describes a hardware architecture for computing both modular multiplication and modular inversion in GF(2n) finite fields, based on a Modified Serial Multiplication/Inversion (MSMI) algorithm. The algorithm is suitable for both hardware implementations and software implementations. The proposed design performs 8-bits, 16-bits, 32-bits or 64-bits modular multiplication or inversion. Our design was modeled using VHDL and implemented in the Xilinx FPGAs Virtex6. Implementation results prove that our MSMI uses only 219 FPGA slices, it achieves a maximum frequency of 150 MHz and it computes 163-bits modular multiplication in 4.21 µ secs.","PeriodicalId":426951,"journal":{"name":"2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","volume":"13 14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DT.2017.8012085","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Arithmetic in GF(2n) finite fields in asymmetric cryptography is the key of an efficient cryptosystems implementation. Thus, cryptosystems based on algebraic curves such as Hyper/Elliptic curves (ECC,HECC) and Pairings need a big number of arithmetic operations. They required several GF(2n) inversions and multiplications which are the most time and area consuming operations. This paper describes a hardware architecture for computing both modular multiplication and modular inversion in GF(2n) finite fields, based on a Modified Serial Multiplication/Inversion (MSMI) algorithm. The algorithm is suitable for both hardware implementations and software implementations. The proposed design performs 8-bits, 16-bits, 32-bits or 64-bits modular multiplication or inversion. Our design was modeled using VHDL and implemented in the Xilinx FPGAs Virtex6. Implementation results prove that our MSMI uses only 219 FPGA slices, it achieves a maximum frequency of 150 MHz and it computes 163-bits modular multiplication in 4.21 µ secs.
针对非对称密码提出了统一的32位乘法器/逆变器
非对称密码系统中GF(2n)有限域的算法是有效实现密码系统的关键。因此,基于超/椭圆曲线(ECC,HECC)和对等代数曲线的密码系统需要大量的算术运算。它们需要几个GF(2n)反转和乘法,这是最耗时和最消耗面积的操作。本文描述了一种基于改进串行乘法/反演(MSMI)算法在GF(2n)有限域中计算模乘法和模反演的硬件结构。该算法既适用于硬件实现,也适用于软件实现。所提出的设计执行8位,16位,32位或64位模块化乘法或反转。我们的设计使用VHDL建模,并在Xilinx fpga Virtex6中实现。实现结果证明,我们的MSMI仅使用219个FPGA片,最大频率达到150 MHz,并在4.21µs内计算163位模块化乘法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信