A High-Performance Hardware Accelerator for Elliptic Curve Cryptography with Curve25519 and Curve448 /

By: Contributor(s): Material type: TextTextLanguage: en Publication details: Bengaluru : Indian Institute of Science, 2024Description: xiv, 41 p. : col. ill. ; e-Thesis 3.085MbSubject(s): DDC classification:
  • 004.56  BAN
Online resources: Dissertation note: MTech (Res) ; 2024 ; Electronic Systems Engineering Summary: In modern critical infrastructures such as power grids, the security of data transmitted among diverse smart devices has become increasingly crucial with the widespread adoption of digital communication technologies while adhering to strict timing specifications. This necessitates the use of cryptographic hardware accelerators. We propose a novel high-performance hardware accelerator featuring a unified architecture designed to support Elliptic Curve Diffie-Hellman Key Exchange operations over NIST standard Montgomery Curves, Curve25519 and Curve448, offering 128-bit and 224-bit security levels, respectively. The accelerator optimizes performance through extensive parallel processing and restructuring of arithmetic operations in the Montgomery Ladder while minimizing area and power consumption by leveraging resource sharing between the two elliptic curves. It executes Karatsuba-style large-integer multiplications and exploits special mathematical properties of the underlying pseudo-Mersenne and Solinas prime fields for fast modular reduction operations. Our ASIC implementation synthesized in a 45 nm technology achieves exceptional execution times for Elliptic Curve Scalar Multiplication (ECSM) of 12.86 μs and 66.91 μs with energy consumption of 4.64 μJ and 24.12 μJ, for Curve25519 and Curve448, respectively, operating at a peak frequency of 80.71 MHz. Notably, our implementation demonstrates nearly two-fold improvement in ECSM performance compared to current state-of-the-art hardware solutions for Curve448. Additionally, the proposed design incorporates several standard countermeasures, including randomized projective coordinates, to mitigate potential timing and power side-channel attacks.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number URL Status Date due Barcode
Thesis Thesis JRD Tata Memorial Library 004.56 BAN (Browse shelf(Opens below)) Link to resource Not For Loan ET00965

Includes bibliographical references

MTech (Res) ; 2024 ; Electronic Systems Engineering

In modern critical infrastructures such as power grids, the security of data transmitted among diverse smart devices has become increasingly crucial with the widespread adoption of digital communication technologies while adhering to strict timing specifications. This necessitates the use of cryptographic hardware accelerators. We propose a novel high-performance hardware accelerator featuring a unified architecture designed to support Elliptic Curve Diffie-Hellman Key Exchange operations over NIST standard Montgomery Curves, Curve25519 and Curve448, offering 128-bit and 224-bit security levels, respectively. The accelerator optimizes performance through extensive parallel processing and restructuring of arithmetic operations in the Montgomery Ladder while minimizing area and power consumption by leveraging resource sharing between the two elliptic curves. It executes Karatsuba-style large-integer multiplications and exploits special mathematical properties of the underlying pseudo-Mersenne and Solinas prime fields for fast modular reduction operations. Our ASIC implementation synthesized in a 45 nm technology achieves exceptional execution times for Elliptic Curve Scalar Multiplication (ECSM) of 12.86 μs and 66.91 μs with energy consumption of 4.64 μJ and 24.12 μJ, for Curve25519 and Curve448, respectively, operating at a peak frequency of 80.71 MHz. Notably, our implementation demonstrates nearly two-fold improvement in ECSM performance compared to current state-of-the-art hardware solutions for Curve448. Additionally, the proposed design incorporates several standard countermeasures, including randomized projective coordinates, to mitigate potential timing and power side-channel attacks.

There are no comments on this title.

to post a comment.

                                                                                                                                                                                                    Facebook    Twitter

                             Copyright © 2024. J.R.D. Tata Memorial Library, Indian Institute of Science, Bengaluru - 560012

                             Contact   Phone: +91 80 2293 2832