Table of Contents Author Guidelines Submit a Manuscript
International Journal of Reconfigurable Computing
Volume 2012 (2012), Article ID 439021, 14 pages
http://dx.doi.org/10.1155/2012/439021
Research Article

A Hardware-Accelerated ECDLP with High-Performance Modular Multiplication

Bradley Department of Electrical and Computer Engineering, Center for Embedded Systems for Critical Applications (CESCA), Virginia Tech, Blacksburg, VA 24061, USA

Received 4 May 2012; Accepted 17 September 2012

Academic Editor: René Cumplido

Copyright © 2012 Lyndon Judge et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. V. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology CRYPTO 85 Proceedings, H. Williams, Ed., vol. 218 of Lecture Notes in Computer Science, pp. 417–426, Springer, Berlin, Germany, 1986. View at Publisher · View at Google Scholar
  2. N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987. View at Google Scholar
  3. I. Blake, G. Seroussi, N. Smart, and J. W. S. Cassels, Advances in Elliptic Curve Cryptography, London Mathematical Society Lecture Note Series, Cambridge University Press, New York, NY, USA, 2005.
  4. J. M. Pollard, “Monte carlo methods of index computation (mod p),” Mathematics of Computation, vol. 32, no. 143, pp. 918–924, 1978. View at Google Scholar
  5. P. C. Van Oorschot and M. J. Wiener, “Parallel collision search with cryptanalytic applications,” Journal of Cryptology, vol. 12, no. 1, pp. 1–28, 1999. View at Google Scholar · View at Scopus
  6. E. Teske, “On random walks for Pollard's rho method,” Mathematics of Computation, vol. 70, no. 234, pp. 809–825, 2001. View at Publisher · View at Google Scholar · View at Scopus
  7. E. Teske, “Speeding up Pollard’s rho method for computing discrete logarithms,” in Algorithmic Number Theory, J. Buhler, Ed., vol. 1423 of Lecture Notes in Computer Science, pp. 541–554, Springer, Berlin, Germany, 1998. View at Google Scholar
  8. R. P. Brent, “An improved Monte Carlo factorization algorithm,” BIT Numerical Mathematics, vol. 20, pp. 176–184, 1980. View at Publisher · View at Google Scholar
  9. J. W. Bos, M. E. Kaihara, T. Kleinjung, A. K. Lenstra, and P. L. Montgomery, “On the security of 1024-bit RSA and 160-bit elliptic curve cryptography,” Report 2009/389, IACR Cryptology ePrint Archive, 2009, http://eprint.iacr.org/2009/389.
  10. J. Bos, T. Kleinjung, R. Niederhagen, and P. Schwabe, “ECC2K-130 on cell CPUs,” in Progress in Cryptology—AFRICACRYPT 2010, D. Bernstein and T. Lange, Eds., vol. 6055 of Lecture Notes in Computer Science, pp. 225–242, Springer, Berlin, Germany, 2010. View at Google Scholar
  11. D. V. Bailey, L. Batina, D. J. Bernstein et al., “Breaking ECC2K-130,” Report 2009/541, IACR Cryptology ePrint Archive, 2009, http://eprint.iacr.org/2009/541.
  12. D. Bernstein, H.-C. Chen, C.-M. Cheng et al., “ECC2K-130 on Nvidia GPUs,” in Progress in Cryptology—INDOCRYPT 2010, G. Gong and K. Gupta, Eds., vol. 6498 of Lecture Notes in Computer Science, pp. 328–346, Springer, Berlin, Germany, 2010. View at Publisher · View at Google Scholar
  13. FIPS 186-3: Digital Signature Standard (DSS), National Institute of Standards and Technology (NIST), June 2009, http://csrc.nist.gov/publications/fips/fips186-3/fips_186-3.pdf.
  14. SEC 2: Recommended Elliptic Curve Domain Parameters, Standards for Efficient Cryptography Group (SECG), January 2010, http://www.secg.org/download/aid-784/sec2-v2.pdf.
  15. D. Bernstein, T. Lange, and P. Schwabe, “On the correct use of the negation map in the Pollard rho method,” in Public Key Cryptography—PKC 2011, D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, Eds., vol. 6571 of Lecture Notes in Computer Science, pp. 128–146, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  16. J. Fan, D. V. Bailey, L. Batina, T. Güneysu, C. Paar, and I. Verbauwhede, “Breaking elliptic curve cryptosystems using reconfigurable hardware,” in Proceedings of the 20th International Conference on Field Programmable Logic and Applications (FPL '10), pp. 133–138, IEEE Computer Society, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Kumar, C. Paar, J. Pelzl, G. Pfeiffer, and M. Schimmler, “Breaking ciphers with COPACOBANA a cost-optimized parallel code breaker,” in Cryptographic Hardware and Embedded Systems—CHES 2006, L. Goubin and M. Matsui, Eds., vol. 4249 of Lecture Notes in Computer Science, pp. 101–118, Springer, Berlin, Germany, 2006. View at Publisher · View at Google Scholar
  18. T. Gueneysu, C. Paar, and J. Pelzl, “Attacking elliptic curve cryptosystems with special-purpose hardware,” in Proceedings of the 15th ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA '07), pp. 207–215, ACM, New York, NY, USA, February 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. T. Güneysu, C. Paar, and J. Pelzl, “Special-purpose hardware for solving the elliptic curve discrete logarithm problem,” ACM Transactions on Reconfigurable Technology and Systems, vol. 1, no. 2, pp. 8:1–8:21, 2008. View at Google Scholar
  20. G. Meurice de Dormale, P. Bulens, and J.-J. Quisquater, “Collision search for elliptic curve discrete logarithm over GF(2m) with FPGA,” in Cryptographic Hardware and Embedded Systems—CHES 2007, P. Paillier and I. Verbauwhede, Eds., vol. 4727 of Lecture Notes in Computer Science, pp. 378–393, Springer, Berlin, Germany, 2007. View at Publisher · View at Google Scholar
  21. P. Majkowski, T. Wojciechowski, M. Wojtyński, M. Rawski, and Z. Kotulski, “Heterogenic distributed system for cryptanalysis of elliptic curve based cryptosystems,” in Proceedings of the 19th International Conference on Systems Engineering (ICSEng '08), pp. 300–305, August 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. J. W. Bos, M. E. Kaihara, T. Kleinjung, A. K. Lenstra, and P. L. Montgomery, “Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction,” International Journal of Applied Cryptography, vol. 2, no. 3, pp. 212–228, 2012. View at Google Scholar
  23. P. L. Montgomery, “Speeding the Pollard and elliptic curve methods of factorization,” Mathematics of Computation, vol. 48, no. 177, pp. 243–264, 1987. View at Google Scholar
  24. D. R. Hankerson, S. A. Vanstone, and A. J. Menezes, Guide to Elliptic Curve Cryptography, Springer, New York, NY, USA, 2004.
  25. T. Güneysu and C. Paar, “Ultra high performance ECC over NIST primes on commercial FPGAs,” in Cryptographic Hardware and Embedded Systems—CHES 2008, E. Oswald and P. Rohatgi, Eds., vol. 5154 of Lecture Notes in Computer Science, pp. 62–78, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar
  26. Virtex-5 FPGA XtremeDSP Design Considerations, Xilinx, Inc., January 2010, http://www.xilinx.com/support/documentation/ user guides/ug193.pdf.
  27. S. Mane, L. Judge, and P. Schaumont, “An integrated prime-field ECDLP hardware accelerator with high-performance modular arithmetic units,” in Proceedings of the International Conference on Reconfigurable Computing and FPGAs (ReConFig '11), P. M. Athanas, J. Becker, and R. Cumplido, Eds., pp. 198–203, IEEE Computer Society, December 2011. View at Publisher · View at Google Scholar