Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.1.143

Hardware Design of Elliptic Curve processor Resistant against Simple Power Analysis Attack  

Choi, Byeong-Yoon (동의대학교 컴퓨터공학과)
Abstract
In this paper hardware implementation of GF($2^{191}$) elliptic curve cryptographic coprocessor which supports 7 operations such as scalar multiplication(kP), Menezes-Vanstone(MV) elliptic curve cipher/decipher algorithms, point addition(P+Q), point doubling(2P), finite-field multiplication/division is described. To meet structure resistant against simple power analysis, the ECC processor adopts the Montgomery scalar multiplication scheme which main loop operation consists of the key-independent operations. It has operational characteristics that arithmetic units, such GF_ALU, GF_MUL, and GF_DIV, which have 1, (m/8), and (m-1) fixed operation cycles in GF($2^m$), respectively, can be executed in parallel. The processor has about 68,000 gates and its simulated worst case delay time is about 7.8 ns under 0.35um CMOS technology. Because it has about 320 kbps cipher and 640 kbps rate and supports 7 finite-field operations, it can be efficiently applied to the various cryptographic and communication applications.
Keywords
ECC cryptography; Public-key cryptography; Power analysis attack; Scalar Multiplication; SoC;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Thomas S. Messerges, "Power Analysis Attacks and Countermeasures for Cryptographic Algorithms", Ph.D Thesis, University of Illinois at Chicago, 2000.
2 박 영호, Side Channel Attack을 고려한 알고리즘 연구, ETRI 최종 연구보고서, 2003. 11.
3 A.J. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993.
4 P. Montgomery, "Speeding the Pollard and elliptic curve methods of factorization", Mathematics of Computation, vol 48, pp.243-264, 1987.   DOI   ScienceOn
5 J. Lopez and R. Dahab, "Fast Multiplication on Elliptic Curves over GF($2^{m}$) without Precomputation", CHES '99, LNCS 1717, pp.316-327, 1999.
6 American Bankers Association, "Working Draft: American National Standard X9.62-1998 Public Key Cryptography for the Financial Services Industry," September 20, 1998.
7 Edoardo D. Mastrovito, VLSI Architectures for Computations in Galois Fields, Linkoping University, Ph.D Thesis, 1991.
8 H. Brunner, A. Curiger, and M. Hosfstetter, "On Computing Multiplicative Inverses in GF($2^{m}$)," IEEE Transaction on Computers, Vol. 42, No. 8, pp.1010-1015, Aug., 1993.   DOI   ScienceOn
9 J. Guo, C. Wang, "Systolic Array Implementation of Euclid's Algorithm for Inversion and Division in GF($2^{m}$)," IEEE Transaction on Computers, Vol.47, No.10, pp.1161-1167, Oct., 1998.   DOI   ScienceOn
10 Samsung Electronics, STD90 /MDL90 0.35um 3.3V CMOS standard cell library for pure logic/ MDL Products, 2000.
11 G. B. Agnew, R. C. Mullin and S. A. Vanstone, "Implementation of Cryptosystems over GF(2155)," IEEE Journal of Selected Area in Communication, Vol. 11, No.5, pp.804-813, 1993.   DOI   ScienceOn
12 김의석, 정용진, "새로운 유한체 나눗셈기를 이용한 타원 곡선 암호(ECC) 스칼라 곱셈기의 설계," 한국 통신 학회 논문지, Vol.29, No.5C, pp.726-736, 2004. 5.