典型文献
An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC
文献摘要:
RSA and ellipse curve cryptography (ECC) algorithms are widely used in authentication, data security, and access control. In this paper, we analyze the basic operation of the ECC and RSA algorithms and optimize their modular multiplication and modular inversion algorithms. We then propose a reconfigurable modular operation architecture, with a mix-memory unit and double multiply-accumulate structures, to realize our unified, asymmetric cryptosystem structure in an operational unit. Synthesized with 55-nm CMOS process, our design runs at 588 MHz and requires only 437801 μm2 of hardware resources. Our proposed design takes 21.92 and 23.36 mW for 2048-bit RSA modular multiplication and modular inversion respectively, as well as 16.16 and 15.88 mW to complete 512-bit ECC dual-field modular multiplication and modular inversion respectively. It is more energy-efficient and flexible than existing single algorithm units. Compared with existing multiple algorithm units, our proposed method shows better performance. The operation unit is embedded in a 64-bit RISC-V processor, realizing key generation, encryption and decryption, and digital signature functions of both RSA and ECC. Our proposed design takes 0.224 and 0.153 ms for 256-bit ECC point multiplication in G(p) and G(2m) respectively, as well as 0.96 ms to complete 1024-bit RSA exponentiation, meeting the demand for high energy efficiency.
文献关键词:
中图分类号:
作者姓名:
Mengni BIE;Wei LI;Tao CHEN;Longmei NAN;Danyang YANG
作者机构:
Information Engineering University,Zhengzhou 450001,China;State Key Lab of ASIC and System,Fudan University,Shanghai 200000,China
文献出处:
引用格式:
[1]Mengni BIE;Wei LI;Tao CHEN;Longmei NAN;Danyang YANG-.An energy-efficient reconfigurable asymmetric modular cryptographic operation unit for RSA and ECC)[J].信息与电子工程前沿(英文),2022(01):134-144
A类:
exponentiation
B类:
An,energy,efficient,reconfigurable,asymmetric,modular,cryptographic,RSA,ECC,ellipse,curve,cryptography,algorithms,widely,used,authentication,data,security,access,control,In,this,paper,analyze,basic,optimize,their,multiplication,inversion,We,architecture,mix,memory,double,multiply,accumulate,structures,realize,unified,cryptosystem,operational,Synthesized,CMOS,design,runs,MHz,requires,only,hardware,resources,Our,proposed,takes,mW,bit,respectively,well,complete,dual,field,It,more,flexible,than,existing,single,units,Compared,multiple,method,shows,better,performance,embedded,RISC,processor,realizing,key,generation,encryption,decryption,digital,signature,functions,both,point,2m,meeting,demand,high,efficiency
AB值:
0.503755
相似文献
机标中图分类号,由域田数据科技根据网络公开资料自动分析生成,仅供学习研究参考。