Advertisement

Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware

  • Jun-Cheol Jeon
  • Kee-Won Kim
  • Byung-Heon Kang
  • Kee-Young Yoo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3993)

Abstract

Elliptic Curve Cryptosystems (ECC) are in the spotlight due to their significantly smaller parameters. The most costly arithmetic operation in ECC is division, which is performed by multiplying the inverse of a multiplicand. On the other hand, Cellular Automata (CA) have attracted a lot of attention regarding their potential for various applications. Thus, this paper presents an EC-based hardware architectural model for division based on CA over Galois Field GF(2 n ). The proposed architectural model is highly regular, expandable, and it has reduced latency based on periodic boundary CA. The proposed architecture can be easily implemented into the hardware design of crypto-coprocessors.

Keywords

Cellular Automaton Elliptic Curve Finite Field Cellular Automaton Architectural Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Lopez, I., Dahab, R.: An overview of Elliptic Curve Cryptography. University of Campinas Press, Brazil (2000)Google Scholar
  2. 2.
    Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)MATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)Google Scholar
  4. 4.
    Menezes, A.J.: Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston (1993)MATHGoogle Scholar
  5. 5.
    Rao, T.R.N., Fujiwara, E.: Error-Control Coding for Computer Systems. Prentice-Hall, Englewood Cliffs (1989)Google Scholar
  6. 6.
    Drescher, W., Bachmann, K., Fettweis, G.: VLSI Architecture for Non Sequential Inversion over GF(2m) using the Euclidean Algorithm. The International Conference on Signal Processing Applications and Technology 2, 1815–1819 (1997)Google Scholar
  7. 7.
    Wang, C.L., Guo, J.H.: New Systolic Arrays for C+AB2, inversion, and division in GF(2m). IEEE Trans. on Computer 49(10), 1120–1125 (2000)CrossRefGoogle Scholar
  8. 8.
    Kim, N.Y., Yoo, K.Y.: Systolic architecture for inversion/division using AB2 circuits in GF(2m). Integration, the VLSI journal 35, 11–24 (2003)CrossRefGoogle Scholar
  9. 9.
    Zhang, C.N., Deng, M.Y., Mason, R.: A VLSI Programmable Cellular Automata Array for Multiplication in GF(2n). In: PDPTA 1999 International Conference (1999)Google Scholar
  10. 10.
    Pal Choudhury, P., Barua, R.: Cellular Automata Based VLSI Architecture for Computing Multiplication and Inverses in GF(2m). In: IEEE 7th International Conference on VLSI Design, pp. 279–282 (1994)Google Scholar
  11. 11.
    Jeon, J.-C., Yoo, K.-Y.: An evolutionary approach to the design of cellular automata architecture for multiplication in elliptic curve cryptography over finite fields. In: Zhang, C., W. Guesgen, H., Yeap, W.-K. (eds.) PRICAI 2004. LNCS (LNAI), vol. 3157, pp. 241–250. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Menezs, A.J.: Applications of Finite Fields. Kluwer Academic Publishers, Boston (1993)Google Scholar
  13. 13.
    IEEE P1363, Standard Specifications for Public Key Cryptography (2000)Google Scholar
  14. 14.
    Wei, S.W.: VLSI architecture of divider for finite field GF(2m). In: IEEE International Symposium on Circuit and Systems, vol. 2, pp. 482–485 (1998)Google Scholar
  15. 15.
    Kaufman, C., Perlman, R., Speciner, M.: Network Security private communication in a public world. Prentice Hall, New Jersey (2002)Google Scholar
  16. 16.
    SEC 1: Elliptic Curve Cryptography version 1.0, Certicom Reserch (2000)Google Scholar
  17. 17.
    Von Neumann, J.: The theory of self-reproducing automata. University of Illinois Press, Urbana (1966)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jun-Cheol Jeon
    • 1
  • Kee-Won Kim
    • 1
  • Byung-Heon Kang
    • 1
  • Kee-Young Yoo
    • 1
  1. 1.Department of Computer EngineeingKyungpook National UniversityDaeguKorea

Personalised recommendations