Browse > Article

Design and Analysis of a Digit-Serial $AB^{2}$ Systolic Arrays in $GF(2^{m})$  

Kim Nam-Yeun (경북대학교 컴퓨터공학과)
Yoo Kee-Young (경북대학교 컴퓨터공학과)
Abstract
Among finite filed arithmetic operations, division/inverse is known as a basic operation for public-key cryptosystems over $GF(2^{m})$ and it is computed by performing the repetitive $AB^{2}$ multiplication. This paper presents a digit-serial-in-serial-out systolic architecture for performing the $AB^2$ operation in GF$(2^{m})$. To obtain L×L digit-serial-in-serial-out architecture, new $AB^{2}$ algorithm is proposed and partitioning, index transformation and merging the cell of the architecture, which is derived from the algorithm, are proposed. Based on the area-time product, when the digit-size of digit-serial architecture, L, is selected to be less than about m, the proposed digit-serial architecture is efficient than bit-parallel architecture, and L is selected to be less than about $(1/5)log_{2}(m+1)$, the proposed is efficient than bit-serial. In addition, the area-time product complexity of pipelined digit-serial $AB^{2}$ systolic architecture is approximately $10.9\%$ lower than that of nonpipelined one, when it is assumed that m=160 and L=8. Additionally, since the proposed architecture can be utilized for the basic architecture of crypto-processor and it is well suited to VLSI implementation because of its simplicity, regularity and pipelinability.
Keywords
Public-key cryptosystem; Power multiplier algorithm; Digit-serial; Systolic array;
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Weste and K. Eshraghian, Principles of CMOS VLSI Design, A System Perspective. Reaking, Mass. Addison-Wesley, 1985
2 Daniel D. Gajski,Principles of Digital Desig, Prentice-hall international, INC, 1997
3 Kung, H. T., and LAM, M., 'Fault tolerant and two level pipelining in VLSI systolic arrays,' Proceedings of MIT conference on Advanced res. VLSI, Cambridge, MA, January 1984, pp.74-83
4 J. H. Guo, C. L. Wang, 'Digit-serial systolic multiplier for finite fields GF($2^m$),' lEE Proc. Comput. Digit. Tech, Vo1.145, No.2, March 1998
5 I. S. Reed and T. K. Truong, 'The use of finite fields to compute evolutions,' IEEE Trans. Inform. Theory, 21, pp.208-213, 1975   DOI
6 D. E. R. Denning, Cryptography and data securit, Addison-Wesley, MA, 1983
7 S. W. Wei, VLSI architectures for computing exponentiations, multiplicative inverses, and divisions $inGF(2^m)$,' IEEE Trans. Circuits and System, 44, pp.847-855, 1997   DOI   ScienceOn
8 S. W. Wei, 'A Systolic Power-Sum Circuit for GF($2^m$),' IEEE Trans. Computers, vol. 43, no. 2, pp. 226-229, Feb. 1994   DOI   ScienceOn
9 S. Y. Kung, VLSI array processors, Prentice Hall, Englewood Cliffs, NJ, 1988
10 W. W. Peterson and E. J. Weldon, Error-correcting codes, MIT Press, MA, 1972
11 A. Menezes, Elliptic Curve Public Key Crypto-system, Kluwer Ademic Publiers, Boston, 1993
12 Rivest, R., A. Shamir and L. Adleman, 'A Method for Obtaining Digital Signature and Public Key Cryptosystems', Comm. of ACM, 21, pp.120-126, 1978   DOI   ScienceOn