...
首页> 外文期刊>International journal of computer science and network security >High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks
【24h】

High Performance Elliptic Curve GF(2m) Cryptoprocessor Secure Against Timing Attacks

机译:高性能椭圆曲线GF(2m)加密处理器可抵抗定时攻击

获取原文

摘要

This paper presents a high performance GF(2m) Elliptic Curve Cryptoprocessor architecture. The proposed cryptoprocessor is based on normal basis representation and uses three multipliers to perform parallel field multiplications. Point operations are performed using Mixed coordinate system to increase the performance and the immunity against timing attacks. The basic idea is to select a combination of point addition and point doubling from Mixed coordinate system such that both point operations requires the same number of multiplication cycles. Thus, an attacker cannot distinguish between point doubling and point addition and therefore it is not possible to extract the key pattern using a timing attack. Results show that the proposed cryptoprocessor gives better time complexity than existing designs which use fake computations by 76%. The proposed cryptoprocessor has been synthesized on a Xilinx Vertex II FPGA (xc2v8000) over GF(2173) and it required 159522 clock cycles to perform scalar multiplication. The proposed cryptoprocessor required 28154 Slices, which is only 60% out of the total number of available Slices.
机译:本文提出了一种高性能的GF(2m)椭圆曲线密码处理器架构。所提出的密码处理器基于正常基础表示,并使用三个乘法器执行并行字段乘法。使用混合坐标系执行点操作,以提高性能和抵抗定时攻击的能力。基本思想是从混合坐标系中选择点加法和点加法的组合,以使两个点运算都需要相同数量的乘法循环。因此,攻击者无法区分分数加倍和分数加法,因此不可能使用定时攻击来提取密钥模式。结果表明,与使用伪造计算的现有设计相比,所提出的密码处理器具有更高的时间复杂度,达到76%。拟议的密码处理器已经在GF(2173)上的Xilinx Vertex II FPGA(xc2v8000)上进行了合成,并且需要159522个时钟周期来执行标量乘法。建议的密码处理器需要28154个分片,仅占可用分片总数的60%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号