Cost-effective design for binary Edwards elliptic curves crypto-processor over GF (2N) using parallel multipliers and architectures
by Qasem Abu Al-Haija; Ahmad Al Badawi
International Journal of Information and Computer Security (IJICS), Vol. 5, No. 3, 2013

Abstract: Arithmetic operations involved in ECC computation suffer from modular inversion operation. Modular inversion is known to be the most time consuming operation performed by the ECC crypto-processor. Inversion operations can be replaced by several simpler multiplication operations using projective coordinates system instead of the classical affine coordinates system. Based on this notion, new elliptic curve cryptographic processor architecture is presented here which results in significant reduction in execution time and gives a range of trade-off between speed and area. This is achieved by exploiting the inherent parallelism that exists in elliptic curve arithmetic computations. In this work, the binary Edwards's projective coordinates system over GF (2n) is presented to perform ECC arithmetic computations using parallel multipliers to obtain maximum parallelism. The projection X/Z, Y/Z when applied to the binary Edwards curves using the best number of parallel multipliers and adders reduces the computation time by 20% less than the use of affine coordinates with full utilisation of multiplier units. Our proposed processor enhances the addition operation time by 1.75 factor compared to the standard curves and four times scale up compared to the serial design of our processor.

Online publication date: Wed, 30-Jul-2014

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Information and Computer Security (IJICS):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com