tailieunhanh - Performance Analysis of Elliptic Curve Cryptography on Reconfigurable Hardware

The Elliptic Curve Cryptography (ECC) is evolving as an important cryptography, and shows a promise to be an alternative of RSA. Small size, high security and other features characterize ECC. Based on the theory of ECC, this paper analyzes its advantages over other cryptographies and focuses on its principle. | Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008 July 2 - 4 2008 London . Performance Analysis of Elliptic Curve Cryptography on Reconfigurable Hardware Prof. Renu Vig Ravi Tandon Abstract This paper presents an efficient FPGA implementation approach of the elliptic curve cryptography. There are many drawbacks in current encryption algorithms RSA AES in respect of security power resources at real-time performance. The Elliptic Curve Cryptography ECC is evolving as an important cryptography and shows a promise to be an alternative of RSA. Small size high security and other features characterize ECC. Based on the theory of ECC this paper analyzes its advantages over other cryptographies and focuses on its principle. Key terms Elliptic curve point addition point doubling Finite field arithmetic Point multiplication virtex FPGA. 1. Introduction It is widely recognized that security issues play a crucial role in the majority of computer and communication systems. A central tool for achieving software protection is Cryptography. Cryptographic algorithms are most efficiently implemented in custom hardware than in software running on general purpose processors. Hardware implementations are of extreme importance in case of high performance security against system intruders and busy systems where a cryptographic task consumes too much time. Traditional ASIC solutions have the well-known drawback of reduced flexibility compared to software solutions. Since modern security protocols are increasingly becoming algorithm independent a high degree of flexibility with respect to the cryptographic algorithms is desirable. The security degrees of all the techniques are based on the hardness of mathematical problems. Among them Elliptic curve cryptography shows a promise to be an alternative of RSA. A promising solution which combines high flexibility with the speed and physical security of traditional hardware is the implementation of cryptographic algorithms .