SlideShare a Scribd company logo
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 2 (May. - Jun. 2013), PP 11-14
www.iosrjournals.org
www.iosrjournals.org 11 | Page
Low Power FPGA Based Elliptical Curve Cryptography
Ajay S1
, Kotresh H2
, Shruthi B S3,
Swetha G S4
, Srividya B V5
1,2,3,4
Students of Telecommunication Engineering department, Dayananda Sagar College of engineering.
5
Assistant Professor, Telecommunication Engineering department, Dayananda Sagar College of engineering.
Bangalore-78
Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the
information. The development of public-key cryptography is the greatest and perhaps the only true revolution in
the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing
up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve
cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the
processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high
security and short key. It is suitable for the hardware of implementation, so ECC has been more and more
focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small
area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation
ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional
successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA.
Index Terms – VHDL, FSM, FPGA, Elliptic Curve Cryptography.
I. Introduction
Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptographic (ECC)
schemes including key exchange, encryption and digital signature. The study of elliptic curves by algebraists,
algebraic geometers and number theorists dates back to the middle of the nineteenth century. Elliptic Curve
Cryptography (ECC) was discovered in1985 by Neil Koblitz and Victor Miller. Elliptic Curve Cryptographic
(ECC) schemes are public-key mechanisms that provide the same functionality as RSA schemes. However, their
security is based on the hardness of a different problem, namely the Elliptic Curve Discrete Logarithmic
Problem (ECDLP). At the time of its discovery, the ECC algorithm was described and placed in the public
domain. What others found was that while it offered greater potential security it was slow. Certicom focused its
efforts on creating better implementations of the algorithm to improve its performance. After many years of
research, Certicom introduced the first commercial toolkit to support ECC and make it practical for use in a
variety of applications. Most of the products and standards that use public-key cryptography for encryption and
digital signatures use RSA schemes. The competing system to RSA is elliptic curve cryptography. The principal
attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size
. An elliptic curve E over a field R of real numbers is defined by an equation
E:y2
+ a1xy + a3y = x3
+ a2x2
+ a4x + a6
Here a1, a2, a3, a4, a6 are real numbers belong to R, x and y take on values in the real numbers. If L is an
extension field of real numbers, then the set of L-rational points on the elliptic curve E is,
In the present paper for the purpose of the encryption and decryption using elliptic curves it is sufficient to
consider the equation of the form y2
= x3
+ a*x + b. For the given values of a and b the plot consists of positive
and negative values of y for each value of x. Thus this curve is symmetric about the x-axis.
1.1 Galois field: -A field with a finite number of elements.[5]
1.2 Geometric rules of Addition: -Let P(x1,y1) and Q(x2,y2) be two points on the elliptic curve E. The sum R
is defined as: First draw a line through P and Q, this line intersects the elliptic curve at a third point. Then the
reflection of this point of intersection about x-axis is R which is the sum of the points P and Q. The same
geometric interpretation also applies to two points P and –P, with the same x-coordinate. The points are joined
by a vertical line, which can be viewed as also intersecting the curve at the infinity point. We therefore have P +
(-P) = ∞, the identity element which is the point at infinity.
1.3 Doubling the point on the elliptic curve:-
First draw the tangent line to the elliptic curve at P which intersects the curve at a point. Then the
reflection of this point about x-axis is R. As an example the addition of two points and doubling of a point are
shown in the following figures 1 and 2 for the elliptic curve
y2
= x3
-x.[3]
Low Power Fpga Based Elliptical Curve Cryptography
www.iosrjournals.org 12 | Page
Fig 1. Geometric addition Fig 2.Geometric doubling
1.4 Identity:-P + ∞ = ∞+P = P for all E (K), where ∞ is the point at infinity.
1.5Negatives:- Let P(x, y) €E (K) then (x, y) + (x,-y) = ∞. Where (x,-y) is the negative of P denoted by –P.
1.6Point addition: - Let P(x1, y1), Q(x2, y2) € E (K) where P ≠ Q. Then P + Q = (xr, yr)
Where,
λ = {(yq -yp)/(xq - yp) mod p. If P≠Q
Xr = (λ2
– xp -xq) mod p.
Yr= (λ (xp–xr) – yp) mod p.
1.7 Points Doubling:-
Let P(x1, y1) €EK (a, b) where P ≠ −P then,
λ = {(3*Xp
2
+ a) / (2*yp)} mod p if P =Q
Xr = (λ2
– xp -xq) mod p.
Yr= (λ (xp –xr) – yp) mod p.
1.8 Point Multiplication: - Let P be any point on the elliptic curve (K). Then the operation multiplication of the
point P is defined as repeated addition. kP = P + P +.........k times
1.9 Elliptic Curve Cryptography: - Elliptic Curve Cryptography (ECC) makes use of the elliptic curve in
which the variables and coefficients are all restricted to elements of the finites fields. Two families of elliptic
curves are used in cryptographic applications: Prime curves over Zp and binary curves GF (2m)
. For a prime
curve over Zp, we use a cubic equation in which the variables and the coefficients all take on values in the set of
integers from 0 through p-1 and the calculations are performed with respect to modulo p.
II. Related Work
Elliptic curve cryptography has been thoroughly researched for the last twenty years. The actual
application of elliptic curve cryptography and the practical implementation of cryptosystem primitives in the
real world constitute interdisciplinary research in computer science as well as in electrical engineering. Elliptic
Curve Cryptography provides an excellent solution not only for the data encryption but also for the secure key
transport between two communicating parties, and authentic session key establishment protocols.
III. Encryption
-If user A wants to communicate the message M to user B then all the characters of the message are coded to
the points on the elliptic curve using the code table which is agreed upon by the communicating parties A and B.
Then each message point is encrypted to a pair of cipher points Y1, Y2 as follows.
Pb=> Public key of B
Pm=> Plain Text
Cm=> Cipher Text
K=>Secret Key.
G => Reference point.
Pa => Public key of A.
Nb=>Private Key of B
Na => Private Key of A.
Low Power Fpga Based Elliptical Curve Cryptography
www.iosrjournals.org 13 | Page
Considering the following example on the cubic curve [8]
Cm= {K, Pm + Na*Pb}
 Na = 2.
 Pa = Na * G = 2(10, 3) = (5, 0).
 Nb = 3.
 Pb = Nb * G= 3(10, 3) = (10, 8).
 K= Na * Pb =2(10, 8) = (5,0).
 Pm = (2, 0).
 Cm={K ,Pm + Na*Pb}
={(5,0),(2,0)+(5,0)}
={(5,0),(2,0)+(5,0)}
= {(5, 0), (4, 0)} = Y1, Y2
Decryption: - After receiving the cipher text, B converts the cipher text into the points on the elliptic curve and
recognizes the points Y1 and Y2 of each character. Then the decrypted message is as follows.
 Pm = y2 – nB* y1
= {(4, 0)-3(5, 0)}
= {(4, 0)-{(5, 0) + (5, 0) + (5, 0)}}
= {(4, 0)-{∞ + (5, 0)}
= {(4, 0) - (5, 0)}
= {(4, 0) + (5, 0)}
= (2, 0)  Pm
Note: - (5, 0) = (5, 0 mod p)
= (5, 0 mod 11)
= + (5, 0)
- (5, -2) = + (5, -2 mod 11)
= + (5, 8)
IV. Simulation Results [7][4]
V. Synthesis Report
Number of Slices: 2089 out of 13696
15%
Number of Slice Flip
Flops:
1100 out of 27392
4%
Number of 4 input
LUTs:
3803 out of 27392
13%
Number of
MULT18X18s:
44 out of 136
32%
Number of GCLKs: 10 out of 16
62%
# Multipliers: 15
# Adders/Subtractors: 20
# Registers: 163
# Latches: 34
# Comparators : 17
Low Power Fpga Based Elliptical Curve Cryptography
www.iosrjournals.org 14 | Page
VI. Timing Summary: [6]
Minimum period: 6.329ns
(Maximum Frequency: 157.995MHz).
Minimum input arrival time before clock; 3.463ns.
Maximum output required time after clock; 5.742ns
VII. Conclusion:-
Elliptic Curve Cryptography provides greater security and more efficient performance than the first
generation public key techniques (RSA and Diffie-Hellman) now in use. As vendors look to upgrade their
systems they should seriously consider the elliptic curve alternative for the computational and bandwidth
advantages they offer at comparable security.
In the encryption algorithm proposed here the communicating parties agree upon to use an elliptic
curve and a point C on the elliptic curve. The security of the Elliptic Curve Cryptography depends on the
difficulty of finding the value of k, given kP where k is a large number and P is a random point on the elliptic
curve. This is the Elliptic Curve Discrete Logarithmic Problem. The elliptic curve parameters for cryptographic
schemes should be carefully chosen in order to resist all known attacks of Elliptic Curve Discrete Logarithmic
Problem (ECDLP).
The straightforward use of public key encryption provides confidentiality but not the authentication. Each
communicating party publishes a specific public key for the communication with a specific communicator. With
this the receiver is assured that the cipher was constructed by the sender only because the sender uses receiver’s
general public keys, receiver’s specific public key published for the sender alone and sender’s private key for
constructing the cipher. This ensures that sender has “digitally signed” the message by using the specific public
key published for him alone by the receiver. Hence, the cipher has achieved the qualities confidentiality,
authentication and non-repudiation. Moreover, each message point is encrypted as a pair of points on the elliptic
curve. Here a random number is used in the encryption of each message point and is different for encryption of
different message points. That is why the same characters in the message space are encrypted to different
characters in the cipher space. In this work on FPGA the implementation on VERTEXxcv1000 architecture
consumes less area and operates at a higher frequency compared to [6] .The difference between characters of
the plain text is not the same as difference between the characters of the cipher text. Due to this the linear
cryptanalysis is highly difficult. In addition to this each character of the message is coded to the point on the
elliptic curve using the code table which is agreed upon by the communicating parties and each message point is
encrypted to a pair of points on the elliptic curve. Hence, the method of encryption proposed here provides
sufficient security against cryptanalysis at relatively low computational overhead.
References
[1] HDL PROGRAMMING, VHDL and VERILOG by”Nazeih M. Botros”.
[2] HDL PROGRAMMING by “J Bhasker”.
[3] Cryptography and Network Security by “William Stallings”.
[4] Prof.Rahila Bilal and Dr.M.Rajaram “International Journal of Computer Applications – Volume 8-No 3 October 2010.
[5] D.Saravana kumar and CH Suneetha,”international journal of distributed and parallel systems (IJDPS)”Vol 3,no 1,jan 2013.
[6] Nele Mentens and JoVliegen “A Compact FPGA Based Architecture for Elliptical Curve Cryptography over Prime Fields”.
[7] Yingjie qu and Zhengming hu “Research and Design of Elliptic Curve Cryptography “(2010 IEEE).
[8] Padma Bh and Chandravathi “International Journal of Computer Science and Engineering’ Vol 2 - 2010

More Related Content

PPT
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Information Security Awareness Group
 
PDF
Data Security Using Elliptic Curve Cryptography
IJCERT
 
PDF
Elliptic Curve Cryptography
Kelly Bresnahan
 
PDF
Survey ecc 09june12
IJASCSE
 
PPTX
Improved security system using steganography and elliptic curve crypto...
atanuanwesha
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PPTX
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
NIT Sikkim
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Information Security Awareness Group
 
Data Security Using Elliptic Curve Cryptography
IJCERT
 
Elliptic Curve Cryptography
Kelly Bresnahan
 
Survey ecc 09june12
IJASCSE
 
Improved security system using steganography and elliptic curve crypto...
atanuanwesha
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
NIT Sikkim
 

What's hot (18)

PDF
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
csandit
 
PDF
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
Computer Science Journals
 
PDF
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
ijceronline
 
PDF
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Editor IJCATR
 
PDF
Ijarcet vol-2-issue-7-2323-2327
Editor IJARCET
 
PDF
Error control coding using bose chaudhuri hocquenghem bch codes
IAEME Publication
 
PDF
Graphical Model Selection for Big Data
Alexander Jung
 
PDF
Comparison of Turbo Codes and Low Density Parity Check Codes
IOSR Journals
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
AM Publications
 
PDF
Design of 4:16 decoder using reversible logic gates
IJERA Editor
 
PDF
Cs6701 cryptography and network security
ArthyR3
 
PDF
14 - 08 Feb - Dynamic Programming
Neeldhara Misra
 
PPTX
Nor Implement
sahed dewan
 
PDF
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
CSCJournals
 
PPTX
Mapping of one model into other model
ratikaagarwal
 
PDF
FPGA based BCH Decoder
ijsrd.com
 
PDF
C046051216
IJERA Editor
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
csandit
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
Computer Science Journals
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
ijceronline
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Editor IJCATR
 
Ijarcet vol-2-issue-7-2323-2327
Editor IJARCET
 
Error control coding using bose chaudhuri hocquenghem bch codes
IAEME Publication
 
Graphical Model Selection for Big Data
Alexander Jung
 
Comparison of Turbo Codes and Low Density Parity Check Codes
IOSR Journals
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
AM Publications
 
Design of 4:16 decoder using reversible logic gates
IJERA Editor
 
Cs6701 cryptography and network security
ArthyR3
 
14 - 08 Feb - Dynamic Programming
Neeldhara Misra
 
Nor Implement
sahed dewan
 
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
CSCJournals
 
Mapping of one model into other model
ratikaagarwal
 
FPGA based BCH Decoder
ijsrd.com
 
C046051216
IJERA Editor
 
Ad

Viewers also liked (20)

PDF
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...
IOSR Journals
 
PDF
QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...
IOSR Journals
 
PDF
Q0749397
IOSR Journals
 
PDF
I0414752
IOSR Journals
 
PDF
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
IOSR Journals
 
PDF
Radiation dose to the eyes of readers at the least distance of distinct visio...
IOSR Journals
 
PDF
Implications of Organisational Culture on Performance of Business Organisations
IOSR Journals
 
PDF
Dust Interception Capacity And Alteration Of Various Biometric And Biochemica...
IOSR Journals
 
PDF
The influence of Rolling process on the porosity and wear behavior of Spray-f...
IOSR Journals
 
PDF
F0644044
IOSR Journals
 
PDF
Formulation of an anti-inflammatory drug as fast dissolving tablets
IOSR Journals
 
PDF
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...
IOSR Journals
 
PDF
An Experimental Study on Strength Properties of Concrete When Cement Is Parti...
IOSR Journals
 
PDF
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical Continuum
IOSR Journals
 
PDF
Transient Three-dimensional Numerical Analysis of Forced Convection Flow and ...
IOSR Journals
 
PDF
Digital Image Watermarking Basics
IOSR Journals
 
PDF
Hair Removal by Using Laser Different
IOSR Journals
 
PDF
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
IOSR Journals
 
PDF
Post Endodontic Restoration: Are You Serious?
IOSR Journals
 
PDF
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...
IOSR Journals
 
Discovery of Self-Sustained 235U Fission Causing Sunlight by Padmanabha Rao E...
IOSR Journals
 
QSAR studies of some anilinoquinolines for their antitumor activity as EGFR i...
IOSR Journals
 
Q0749397
IOSR Journals
 
I0414752
IOSR Journals
 
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
IOSR Journals
 
Radiation dose to the eyes of readers at the least distance of distinct visio...
IOSR Journals
 
Implications of Organisational Culture on Performance of Business Organisations
IOSR Journals
 
Dust Interception Capacity And Alteration Of Various Biometric And Biochemica...
IOSR Journals
 
The influence of Rolling process on the porosity and wear behavior of Spray-f...
IOSR Journals
 
F0644044
IOSR Journals
 
Formulation of an anti-inflammatory drug as fast dissolving tablets
IOSR Journals
 
Analytical Determination of Antihestamine drugs Pure and its pharmaceutical P...
IOSR Journals
 
An Experimental Study on Strength Properties of Concrete When Cement Is Parti...
IOSR Journals
 
Effective Leadership-Employee Retention-Work Life Balance: A Cyclical Continuum
IOSR Journals
 
Transient Three-dimensional Numerical Analysis of Forced Convection Flow and ...
IOSR Journals
 
Digital Image Watermarking Basics
IOSR Journals
 
Hair Removal by Using Laser Different
IOSR Journals
 
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Ses...
IOSR Journals
 
Post Endodontic Restoration: Are You Serious?
IOSR Journals
 
The Comparison of theMaterials in Styles of Iranian Architecture and its Effe...
IOSR Journals
 
Ad

Similar to Low Power FPGA Based Elliptical Curve Cryptography (20)

PPTX
ECC.pptx Ecc cryptography for secure encrypted message and decryption using ...
sameenakhan1805
 
PDF
Improved authenticated elliptic curve cryptography scheme for resource starve...
CSITiaesprime
 
PDF
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
PPT
Lect no 13 ECC.ppt
DEEPAK948083
 
PPT
Lect no 13 ECC.ppt
DEEPAK948083
 
PDF
Implementation and Secured Authentication Key using Elliptic Curve Cryptography
AM Publications,India
 
PDF
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
ijcisjournal
 
PPTX
ellipticcurvecryptography.pptx
AYUSHJAIN152065
 
PDF
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
PDF
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
TELKOMNIKA JOURNAL
 
PDF
Implementation Secure Authentication Using Elliptic Curve Cryptography
AM Publications
 
PPTX
Eliptic_Curvve_Method_Cryptography .pptx
NemesisPunisher
 
DOCX
Assignment 2 (1) (1).docx
pinstechwork
 
PDF
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
AM Publications
 
PDF
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Entrust Datacard
 
PPTX
Convolution presentation
Soham Mondal
 
PDF
Efficient ECC encryption for WSN’s
IDES Editor
 
PDF
An Introduction to ECDSA and it's use in Bitcoin (1)
Hakeem Hunte
 
PPTX
Novel encryption algorithm and software development ecc and rsa
Soham Mondal
 
PDF
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
IJECEIAES
 
ECC.pptx Ecc cryptography for secure encrypted message and decryption using ...
sameenakhan1805
 
Improved authenticated elliptic curve cryptography scheme for resource starve...
CSITiaesprime
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
IOSR Journals
 
Lect no 13 ECC.ppt
DEEPAK948083
 
Lect no 13 ECC.ppt
DEEPAK948083
 
Implementation and Secured Authentication Key using Elliptic Curve Cryptography
AM Publications,India
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
ijcisjournal
 
ellipticcurvecryptography.pptx
AYUSHJAIN152065
 
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
TELKOMNIKA JOURNAL
 
Implementation Secure Authentication Using Elliptic Curve Cryptography
AM Publications
 
Eliptic_Curvve_Method_Cryptography .pptx
NemesisPunisher
 
Assignment 2 (1) (1).docx
pinstechwork
 
Survey: Elliptic Curve Cryptography using Scalar Multiplication Algorithms
AM Publications
 
Zero to ECC in 30 Minutes: A primer on Elliptic Curve Cryptography (ECC)
Entrust Datacard
 
Convolution presentation
Soham Mondal
 
Efficient ECC encryption for WSN’s
IDES Editor
 
An Introduction to ECDSA and it's use in Bitcoin (1)
Hakeem Hunte
 
Novel encryption algorithm and software development ecc and rsa
Soham Mondal
 
Design a cryptosystem using elliptic curves cryptography and Vigenère symmetr...
IJECEIAES
 

More from IOSR Journals (20)

PDF
A011140104
IOSR Journals
 
PDF
M0111397100
IOSR Journals
 
PDF
L011138596
IOSR Journals
 
PDF
K011138084
IOSR Journals
 
PDF
J011137479
IOSR Journals
 
PDF
I011136673
IOSR Journals
 
PDF
G011134454
IOSR Journals
 
PDF
H011135565
IOSR Journals
 
PDF
F011134043
IOSR Journals
 
PDF
E011133639
IOSR Journals
 
PDF
D011132635
IOSR Journals
 
PDF
C011131925
IOSR Journals
 
PDF
B011130918
IOSR Journals
 
PDF
A011130108
IOSR Journals
 
PDF
I011125160
IOSR Journals
 
PDF
H011124050
IOSR Journals
 
PDF
G011123539
IOSR Journals
 
PDF
F011123134
IOSR Journals
 
PDF
E011122530
IOSR Journals
 
PDF
D011121524
IOSR Journals
 
A011140104
IOSR Journals
 
M0111397100
IOSR Journals
 
L011138596
IOSR Journals
 
K011138084
IOSR Journals
 
J011137479
IOSR Journals
 
I011136673
IOSR Journals
 
G011134454
IOSR Journals
 
H011135565
IOSR Journals
 
F011134043
IOSR Journals
 
E011133639
IOSR Journals
 
D011132635
IOSR Journals
 
C011131925
IOSR Journals
 
B011130918
IOSR Journals
 
A011130108
IOSR Journals
 
I011125160
IOSR Journals
 
H011124050
IOSR Journals
 
G011123539
IOSR Journals
 
F011123134
IOSR Journals
 
E011122530
IOSR Journals
 
D011121524
IOSR Journals
 

Recently uploaded (20)

PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
unit 3a.pptx material management. Chapter of operational management
atisht0104
 
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Hyogeun Oh
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
EE3303-EM-I 25.7.25 electrical machines.pptx
Nagen87
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
Software Testing Tools - names and explanation
shruti533256
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
PPTX
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
PPTX
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
ternal cell structure: leadership, steering
hodeeesite4
 
Inventory management chapter in automation and robotics.
atisht0104
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
Information Retrieval and Extraction - Module 7
premSankar19
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
unit 3a.pptx material management. Chapter of operational management
atisht0104
 
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
Hyogeun Oh
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
EE3303-EM-I 25.7.25 electrical machines.pptx
Nagen87
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
Software Testing Tools - names and explanation
shruti533256
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
Introduction to Ship Engine Room Systems.pdf
Mahmoud Moghtaderi
 
AgentX UiPath Community Webinar series - Delhi
RohitRadhakrishnan8
 
Civil Engineering Practices_BY Sh.JP Mishra 23.09.pptx
bineetmishra1990
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
ternal cell structure: leadership, steering
hodeeesite4
 

Low Power FPGA Based Elliptical Curve Cryptography

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 6, Issue 2 (May. - Jun. 2013), PP 11-14 www.iosrjournals.org www.iosrjournals.org 11 | Page Low Power FPGA Based Elliptical Curve Cryptography Ajay S1 , Kotresh H2 , Shruthi B S3, Swetha G S4 , Srividya B V5 1,2,3,4 Students of Telecommunication Engineering department, Dayananda Sagar College of engineering. 5 Assistant Professor, Telecommunication Engineering department, Dayananda Sagar College of engineering. Bangalore-78 Abstract: Cryptography is the study of techniques for ensuring the secrecy and authentication of the information. The development of public-key cryptography is the greatest and perhaps the only true revolution in the entire history of cryptography. Elliptic Curve Cryptography is one of the public-key cryptosystem showing up in standardization efforts, including the IEEE P1363 Standard. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size, thereby reducing the processing overhead. As a Public-Key Cryptosystem, ECC has many advantages such as fast speed, high security and short key. It is suitable for the hardware of implementation, so ECC has been more and more focused in recent years. The hardware implementation of ECC on FPGA uses the arithmetic unit that has small area, small storage unit and fast speed, and it is an extremely suitable system which has limited computation ability and storage space.[1][2] The modular arithmetic division operations are carried out using conditional successive subtractions, thereby reducing the area. The system is implemented on Vertex-Pro XCV1000 FPGA. Index Terms – VHDL, FSM, FPGA, Elliptic Curve Cryptography. I. Introduction Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptographic (ECC) schemes including key exchange, encryption and digital signature. The study of elliptic curves by algebraists, algebraic geometers and number theorists dates back to the middle of the nineteenth century. Elliptic Curve Cryptography (ECC) was discovered in1985 by Neil Koblitz and Victor Miller. Elliptic Curve Cryptographic (ECC) schemes are public-key mechanisms that provide the same functionality as RSA schemes. However, their security is based on the hardness of a different problem, namely the Elliptic Curve Discrete Logarithmic Problem (ECDLP). At the time of its discovery, the ECC algorithm was described and placed in the public domain. What others found was that while it offered greater potential security it was slow. Certicom focused its efforts on creating better implementations of the algorithm to improve its performance. After many years of research, Certicom introduced the first commercial toolkit to support ECC and make it practical for use in a variety of applications. Most of the products and standards that use public-key cryptography for encryption and digital signatures use RSA schemes. The competing system to RSA is elliptic curve cryptography. The principal attraction of elliptic curve cryptography compared to RSA is that it offers equal security for a smaller key-size . An elliptic curve E over a field R of real numbers is defined by an equation E:y2 + a1xy + a3y = x3 + a2x2 + a4x + a6 Here a1, a2, a3, a4, a6 are real numbers belong to R, x and y take on values in the real numbers. If L is an extension field of real numbers, then the set of L-rational points on the elliptic curve E is, In the present paper for the purpose of the encryption and decryption using elliptic curves it is sufficient to consider the equation of the form y2 = x3 + a*x + b. For the given values of a and b the plot consists of positive and negative values of y for each value of x. Thus this curve is symmetric about the x-axis. 1.1 Galois field: -A field with a finite number of elements.[5] 1.2 Geometric rules of Addition: -Let P(x1,y1) and Q(x2,y2) be two points on the elliptic curve E. The sum R is defined as: First draw a line through P and Q, this line intersects the elliptic curve at a third point. Then the reflection of this point of intersection about x-axis is R which is the sum of the points P and Q. The same geometric interpretation also applies to two points P and –P, with the same x-coordinate. The points are joined by a vertical line, which can be viewed as also intersecting the curve at the infinity point. We therefore have P + (-P) = ∞, the identity element which is the point at infinity. 1.3 Doubling the point on the elliptic curve:- First draw the tangent line to the elliptic curve at P which intersects the curve at a point. Then the reflection of this point about x-axis is R. As an example the addition of two points and doubling of a point are shown in the following figures 1 and 2 for the elliptic curve y2 = x3 -x.[3]
  • 2. Low Power Fpga Based Elliptical Curve Cryptography www.iosrjournals.org 12 | Page Fig 1. Geometric addition Fig 2.Geometric doubling 1.4 Identity:-P + ∞ = ∞+P = P for all E (K), where ∞ is the point at infinity. 1.5Negatives:- Let P(x, y) €E (K) then (x, y) + (x,-y) = ∞. Where (x,-y) is the negative of P denoted by –P. 1.6Point addition: - Let P(x1, y1), Q(x2, y2) € E (K) where P ≠ Q. Then P + Q = (xr, yr) Where, λ = {(yq -yp)/(xq - yp) mod p. If P≠Q Xr = (λ2 – xp -xq) mod p. Yr= (λ (xp–xr) – yp) mod p. 1.7 Points Doubling:- Let P(x1, y1) €EK (a, b) where P ≠ −P then, λ = {(3*Xp 2 + a) / (2*yp)} mod p if P =Q Xr = (λ2 – xp -xq) mod p. Yr= (λ (xp –xr) – yp) mod p. 1.8 Point Multiplication: - Let P be any point on the elliptic curve (K). Then the operation multiplication of the point P is defined as repeated addition. kP = P + P +.........k times 1.9 Elliptic Curve Cryptography: - Elliptic Curve Cryptography (ECC) makes use of the elliptic curve in which the variables and coefficients are all restricted to elements of the finites fields. Two families of elliptic curves are used in cryptographic applications: Prime curves over Zp and binary curves GF (2m) . For a prime curve over Zp, we use a cubic equation in which the variables and the coefficients all take on values in the set of integers from 0 through p-1 and the calculations are performed with respect to modulo p. II. Related Work Elliptic curve cryptography has been thoroughly researched for the last twenty years. The actual application of elliptic curve cryptography and the practical implementation of cryptosystem primitives in the real world constitute interdisciplinary research in computer science as well as in electrical engineering. Elliptic Curve Cryptography provides an excellent solution not only for the data encryption but also for the secure key transport between two communicating parties, and authentic session key establishment protocols. III. Encryption -If user A wants to communicate the message M to user B then all the characters of the message are coded to the points on the elliptic curve using the code table which is agreed upon by the communicating parties A and B. Then each message point is encrypted to a pair of cipher points Y1, Y2 as follows. Pb=> Public key of B Pm=> Plain Text Cm=> Cipher Text K=>Secret Key. G => Reference point. Pa => Public key of A. Nb=>Private Key of B Na => Private Key of A.
  • 3. Low Power Fpga Based Elliptical Curve Cryptography www.iosrjournals.org 13 | Page Considering the following example on the cubic curve [8] Cm= {K, Pm + Na*Pb}  Na = 2.  Pa = Na * G = 2(10, 3) = (5, 0).  Nb = 3.  Pb = Nb * G= 3(10, 3) = (10, 8).  K= Na * Pb =2(10, 8) = (5,0).  Pm = (2, 0).  Cm={K ,Pm + Na*Pb} ={(5,0),(2,0)+(5,0)} ={(5,0),(2,0)+(5,0)} = {(5, 0), (4, 0)} = Y1, Y2 Decryption: - After receiving the cipher text, B converts the cipher text into the points on the elliptic curve and recognizes the points Y1 and Y2 of each character. Then the decrypted message is as follows.  Pm = y2 – nB* y1 = {(4, 0)-3(5, 0)} = {(4, 0)-{(5, 0) + (5, 0) + (5, 0)}} = {(4, 0)-{∞ + (5, 0)} = {(4, 0) - (5, 0)} = {(4, 0) + (5, 0)} = (2, 0)  Pm Note: - (5, 0) = (5, 0 mod p) = (5, 0 mod 11) = + (5, 0) - (5, -2) = + (5, -2 mod 11) = + (5, 8) IV. Simulation Results [7][4] V. Synthesis Report Number of Slices: 2089 out of 13696 15% Number of Slice Flip Flops: 1100 out of 27392 4% Number of 4 input LUTs: 3803 out of 27392 13% Number of MULT18X18s: 44 out of 136 32% Number of GCLKs: 10 out of 16 62% # Multipliers: 15 # Adders/Subtractors: 20 # Registers: 163 # Latches: 34 # Comparators : 17
  • 4. Low Power Fpga Based Elliptical Curve Cryptography www.iosrjournals.org 14 | Page VI. Timing Summary: [6] Minimum period: 6.329ns (Maximum Frequency: 157.995MHz). Minimum input arrival time before clock; 3.463ns. Maximum output required time after clock; 5.742ns VII. Conclusion:- Elliptic Curve Cryptography provides greater security and more efficient performance than the first generation public key techniques (RSA and Diffie-Hellman) now in use. As vendors look to upgrade their systems they should seriously consider the elliptic curve alternative for the computational and bandwidth advantages they offer at comparable security. In the encryption algorithm proposed here the communicating parties agree upon to use an elliptic curve and a point C on the elliptic curve. The security of the Elliptic Curve Cryptography depends on the difficulty of finding the value of k, given kP where k is a large number and P is a random point on the elliptic curve. This is the Elliptic Curve Discrete Logarithmic Problem. The elliptic curve parameters for cryptographic schemes should be carefully chosen in order to resist all known attacks of Elliptic Curve Discrete Logarithmic Problem (ECDLP). The straightforward use of public key encryption provides confidentiality but not the authentication. Each communicating party publishes a specific public key for the communication with a specific communicator. With this the receiver is assured that the cipher was constructed by the sender only because the sender uses receiver’s general public keys, receiver’s specific public key published for the sender alone and sender’s private key for constructing the cipher. This ensures that sender has “digitally signed” the message by using the specific public key published for him alone by the receiver. Hence, the cipher has achieved the qualities confidentiality, authentication and non-repudiation. Moreover, each message point is encrypted as a pair of points on the elliptic curve. Here a random number is used in the encryption of each message point and is different for encryption of different message points. That is why the same characters in the message space are encrypted to different characters in the cipher space. In this work on FPGA the implementation on VERTEXxcv1000 architecture consumes less area and operates at a higher frequency compared to [6] .The difference between characters of the plain text is not the same as difference between the characters of the cipher text. Due to this the linear cryptanalysis is highly difficult. In addition to this each character of the message is coded to the point on the elliptic curve using the code table which is agreed upon by the communicating parties and each message point is encrypted to a pair of points on the elliptic curve. Hence, the method of encryption proposed here provides sufficient security against cryptanalysis at relatively low computational overhead. References [1] HDL PROGRAMMING, VHDL and VERILOG by”Nazeih M. Botros”. [2] HDL PROGRAMMING by “J Bhasker”. [3] Cryptography and Network Security by “William Stallings”. [4] Prof.Rahila Bilal and Dr.M.Rajaram “International Journal of Computer Applications – Volume 8-No 3 October 2010. [5] D.Saravana kumar and CH Suneetha,”international journal of distributed and parallel systems (IJDPS)”Vol 3,no 1,jan 2013. [6] Nele Mentens and JoVliegen “A Compact FPGA Based Architecture for Elliptical Curve Cryptography over Prime Fields”. [7] Yingjie qu and Zhengming hu “Research and Design of Elliptic Curve Cryptography “(2010 IEEE). [8] Padma Bh and Chandravathi “International Journal of Computer Science and Engineering’ Vol 2 - 2010