Table of Contents Author Guidelines Submit a Manuscript
International Journal of Reconfigurable Computing
Volume 2016, Article ID 6371403, 10 pages
http://dx.doi.org/10.1155/2016/6371403
Research Article

FPGA Based High Speed SPA Resistant Elliptic Curve Scalar Multiplier Architecture

1Electrical Engineering Department, COMSATS Institute of Information Technology, Abbottabad, Pakistan
2School of Electronic Engineering, Dublin City University, Dublin, Ireland
3School of Computer & Software, Nanjing University of Information Science and Technology, Nanjing, Jiangsu, China

Received 16 December 2015; Revised 30 March 2016; Accepted 3 May 2016

Academic Editor: Michael Hübner

Copyright © 2016 Khalid Javeed and Xiaojun Wang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

The higher computational complexity of an elliptic curve scalar point multiplication operation limits its implementation on general purpose processors. Dedicated hardware architectures are essential to reduce the computational time, which results in a substantial increase in the performance of associated cryptographic protocols. This paper presents a unified architecture to compute modular addition, subtraction, and multiplication operations over a finite field of large prime characteristic . Subsequently, dual instances of the unified architecture are utilized in the design of high speed elliptic curve scalar multiplier architecture. The proposed architecture is synthesized and implemented on several different Xilinx FPGA platforms for different field sizes. The proposed design computes a 192-bit elliptic curve scalar multiplication in 2.3 ms on Virtex-4 FPGA platform. It is 34 faster and requires 40 fewer clock cycles for elliptic curve scalar multiplication and consumes considerable fewer FPGA slices as compared to the other existing designs. The proposed design is also resistant to the timing and simple power analysis (SPA) attacks; therefore it is a good choice in the construction of fast and secure elliptic curve based cryptographic protocols.