Affiliation:
1. Deanship of Scientific Research, Umm Al Qura University, Makkah 21955, Saudi Arabia
2. Computer Engineering Department, Umm Al Qura University, Makkah 21955, Saudi Arabia
3. Computer Science Department, Umm Al Qura University, Makkah 21955, Saudi Arabia
Abstract
Binary Edwards Curves (BEC) play a pivotal role in modern cryptographic processes and applications, offering a combination of robust security as well as computational efficiency. For robust security, this article harnesses the inherent strengths of BEC for the cryptographic point multiplication process by utilizing the Non-Adjacent Form (NAF) algorithm. For computational efficiency, a hardware architecture for the NAF algorithm is proposed. Central to this architecture is an Arithmetic Logic Unit (ALU) designed for streamlined execution of essential operations, including addition, squaring, and multiplication. One notable innovation in our ALU design is the integration of multiplexers, which maximize ALU efficiency with minimal additional hardware requirements. Complementing the optimized ALU, the proposed architecture incorporates a radix-4 multiplier, renowned for its efficiency in both multiplication and reduction. It eliminates resource-intensive divisions, resulting in a substantial boost to overall computational speed. The architecture is implemented on Xilinx Virtex series Field-Programmable Gate Arrays (FPGAs). It achieves throughput-to-area ratios of 14.819 (Virtex-4), 25.5 (Virtex-5), 34.58 (Virtex-6), and 37.07 (Virtex-7). These outcomes underscore the efficacy of our optimizations, emphasizing an equilibrium between computational performance and area utilization.
Funder
Deanship for Research & Innovation, Ministry of Education in Saudi Arabia
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference26 articles.
1. Katz, J., and Lindell, Y. (2020). Introduction to Modern Cryptography, CRC Press.
2. Transitioning organizations to post-quantum cryptography;Joseph;Nature,2022
3. Symmetric Cryptography: Recent Advances and Future Directions;Wu;IEEE Trans. Inf. Forensics Secur.,2022
4. Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey;Ullah;Comput. Sci. Rev.,2023
5. A secure framework for authentication and encryption using improved ECC for IoT-based medical sensor data;Khan;IEEE Access,2020
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献