Professional Documents
Culture Documents
Ecc 2018
Ecc 2018
Abstract—With the continuous evolution of the global with ECC can be used for encryption. The security of
internet, the security of exchanging information has become ECC comes from the difficulty of Elliptic Curve Discrete
increasingly serious. Many malicious entities can retrieve Logarithm Problem (ECDLP) just as DH, depends on the
the valuable information via an unsecured medium. In
this regard, Elliptic Curve Cryptography (ECC) is widely discrete logarithm problem (DLP) and RSA relies upon
accepted and has become the attractive choice for encrypting the factoring problem. The ECDLP defines as if P and
information. Many researchers have studied the security of Q are points on the curve, then kP = Q where, ‘k’ is a
ECC and indicated as one of the most secure cryptographic scalar then it is complex to obtain ‘k’ even if P and Q
algorithms. This paper discusses the design and implemen- are known hence, this problem can be used to achieve a
tation of Text Encryption using ECC over 192 bit prime
Field on FPGA. The proposed 192 bit ECC encryption and higher level of security in cryptosystems. [12].
decryption modules are modeled in Verilog and simulated Over the past couple of years, ECC is well accepted in
using Xilinx Vivado 2016.2. In this paper, FPGA chosen here the industry and has been adopted by many standards such
is AC-701 which is evaluation board based on the Artix- as NIST [13], IEEE [14], ANSI [15], ISO [16], and SEC2
7 FPGA from Xilinx. Furthermore, the work demonstrates
[17]. The features of ECC includes strong security, smaller
the resource utilization and power consumption of proposed
encryption and decryption modules on FPGA. The authors key length, and fast computations, make ECC one of the
also presented the throughput analysis of different operations most secure algorithm to be implemented on Hardware.
of design. [18].
Index Terms—Cryptography, ECC, Encryption, Decryp-
tion, FPGA, Synthesis A. Related Works
I. I NTRODUCTION Authors in [19] have proposed the FPGA implemen-
In this Global Era, Security of private information is tation of elliptic curve cryptography using montgomery
becoming a major challenging issue. This is due to data point multiplication in order to protect the security of
transmission over open networks such as an internet. To web transactions. Another FPGA implementation of ECC
ensure data privacy, Cryptography has become a crucial is presented by authors in [20] using Montgomery Mul-
tool that deals with the actual securing of digital informa- tiplication for Equal Key and Data size over GF (2m )
tion against unauthorized access [1]. In order to protect for Wireless Sensor Networks. Authors in [21] presented
information from a potential hacker, the traditional public implementation of Elliptic Curve Cryptography engine
key cryptosystems such as Digital Signature Algorithm over a binary field for Personal Communication Systems
(DSA), ElGamal, and Rivest-Shamir-Adleman(RSA) are on FPGA. Author in [22] have proposed a scalable GF (p)
inadequate due to the availability of a longer size of keys elliptic curve processor architecture for programmable
[2]. Therefore, the another cryptosystem based on Elliptic hardware and also an inverter based on Fermat’s theorem
Curve Cryptography (ECC) is becoming more demanding for computing inversion operation and for computing
because it offers better performance with the equivalent modular multiplication a high radix montgomery multi-
security level and having significantly smaller keys as plier is used.
compared to other cryptosystems [3]. The benefits of ECC
B. Contribution and Outline
gave rise to a variety of applications areas such as smart
card [4], Radio Frequency Identification (RFID Tag) [5], In this paper, Authors have implemented Text encryp-
medical and health care [6] and Wireless Sensor Networks tion using ECC over a 192-bit prime field in an affine
[7] etc. coordinate system on FPGA. Firstly, the Text message is
ECC is a relatively new cryptosystem, was invented encoded to an affine point on the elliptic curve and further,
independently by Victor Miller [8] and Neal Koblitz [9] the algorithm is implemented on Hardware to analyze the
in mid-1980. The popular standard Diffie-Hellman (DH) performance in terms of area and speed.
key exchange protocol [10] is replaced with Elliptic Curve This paper is organized as follows. Section II introduces
Diffie-Hellman (ECDH) for key exchange over the elliptic Elliptic curve cryptography over Prime Field Fp . Section
curve.The combination of ECC with DSA [11] can be III describes the ECC Algorithm. Section IV presents
used for message signing and by combining Elgamal Design and implementation of ECC over Fp . Section
344
C2 =M +kQA and send pair of cipher text points to Alice The message M(x,y) in coordinate form is transformed to
C={ C1 ,C2 }. integer form m using equation (7)
jxk
m= (7)
d
where x denotes the coordinate of M(x,y) and d is a ran-
dom number. This process of conversion is called message
decoding. After decoding, the message m is converted
back to ASCII values by using following equation (8)
j m k
ak = k−1 mod b (8)
b
where, b = 28 represents an 8-bit encoding system for
ASCII values and ak denotes sequence of ASCII values
corresponding to a particular character.
Figure 2 represents Encryption and Decryption Process
345
(SEC). Authors have chosen secp192r1 elliptic curve for
implementation. For 192 bit prime field [17], the Domain
parameters of the simulation are as follows.
a=62771017353866807638357894232076664160839087
00390324961276
b=24551555460089438177402939151974517847691080
58161191238065
p=62771017353866807638357894232076664160839087
Figure 3. Hardware Module of Point Multiplication 00390324961279
(Gx,Gy)=(6020462823756886567582134805875261119
16698976636884684818,17405033229362203140485755
is ‘0’,the intermediate signal registers are updated with 2280219410364023488927386650641)
new result for every clock cycle. Finally, the output flag n=627710173538668076383578942317605901376719477
will be enabled once the encryption operation is complete, 3182842284081
and the results are stored in output registers C1 (x,y) and Here, a and b are the constants of elliptic curve equation
C2 (x,y). y 2 = x3 + ax + b , p is prime number, Gx and Gy are
the Generator points on elliptic curve and n is order of
curve.
346
Figure 6. Simulation Results of Key Generation
347
Table I
U TILIZATION S UMMARY
Utilization Utilization
Usage Usage
Device Resources Available (Encryption (Decryption
(%) (%)
Module) Module)
LUTs 133800 84706 63.3% 3811 3.3%
Artix-7 LUTRAM 46200 24 0.05% 24 0.05%
(ac-701) FF 267600 10617 3.97% 5378 2.01%
BUFG 32 3 9.38% 3 9.38%
Table II
P OWER C ONSUMPTION R EPORT
Static Total
Device Module Clocks Signals Logic
Power Power
Artix Encryption 0.001W 0.369W 0.318W 0.134W 0.822W
(ac-701) Decryption 0.001W 0.002W 0.001W 0.131W 0.135W
Table III
T HROUGHPUT A NALYSIS
348
[15] ANSI X9.62-1999, the Elliptic Curve Digital Signature Algorithm,
ANSI, Washington, D.C., USA, 1999.
[16] ISO/IEC 14888-3, Information technology Security techniques
Digital signatures with appendix Part 3: Discrete logarithm based
mechanisms, 2006.
[17] SEC.2. Recommended elliptic curve domain parameters, Standard
for efficient cryptography. The SECG Group, 2000.
[18] T. Güneysu, and C. Paar, “Ultra high performance ECC over
NIST primes on commercial FPGAs.” in International Workshop on
Cryptographic Hardware and Embedded Systems, 2008, pp. 62-78.
[19] J. Huang, H. Li, and P.H. Sweany, “An FPGA implementation of
elliptic curve cryptography for future secure web transaction.” in
ISCA PDCS, 2007, pp. 296-301.
[20] M. B. I. Reaz, J. Jalil, H. Husian, and F. H. Hashim, “FPGA
Implementation of Elliptic Curve Cryptography Engine for Per-
sonal Communication Systems,” in WSEAS TRANSACTIONS on
CIRCUITS and SYSTEMS, vol. 11, 2012, pp. 82-91.
[21] G. Leelavathi, K. Shaila, and K. R. Venugopal. “Elliptic Curve
Cryptography implementation on FPGA using Montgomery multi-
plication for equal key and data size over GF (2m ) for Wireless
Sensor Networks.” in Region 10 Conference (TENCON), IEEE,
2016, pp. 468-471.
[22] G. Orlando and C. Paar, “A scalable GF (p) elliptic curve processor
architecture for programmable hardware” in International Workshop
on Cryptographic Hardware and Embedded Systems, 2001, pp. 356-
371.
[23] R. Bahram “A Survey on Hardware Implementations of Elliptic
Curve Cryptosystems.” CoRR abs/1710.08336 (2017).
[24] Debdeep Mukhopadhyay, Classnotes,Topic: “Elliptic Curve Cryp-
tography” Dept of Computer Sc and Engg IIT Madras.
[25] N. Nedjah, and L. de Macedo Mourelle. “A review of modular
multiplication methods and respective hardware implementation.”
Informatica, vol. 30, no. 1, 2006.
[26] E. Chiranth, H. V. A. Chakravarthy, P. Nagamohanareddy, T. H.
Umesh, and M. Chethan Kumar. “Implementation of rsa Cryptosys-
tem using verilog.” in International Journal of Scientific Engineer-
ing Research, vol. 2, no. 5, pp. 1-7, 2011.
[27] G. Lai, “Analysis of modular inverse GF (p) implementations.”
IEEE Trans. Inform. School Of Electrical Engineering And Com-
puter Science, Oregon State University, Corvallis, Oregon, vol.
97331, 2004.
[28] M. S. Hossain, and Y. Kong “High-Performance FPGA Imple-
mentation of Modular inverse over F256 for Elliptic Curve Cryp-
tography” in International Conference on Data Science and Data
Intensive Systems (DSDIS), IEEE, pp. 169-174, 2015.
[29] Reneẽ Brady. Florida AM University. Naleceia Davis. Spelman
College. Anna Tracy. University of the South, “Encrypting with
Elliptic Curve Cryptography”, July 2010
[30] R. Vig, and R. Tandon. “Performance Analysis of Elliptic Curve
Cryptography on Reconfigurable Hardware.” in Proceedings of the
World Congress on Engineering, vol. 1, 2008.
349