دانلود مقاله ISI انگلیسی شماره 25433
ترجمه فارسی عنوان مقاله

منطقه / تجزیه و تحلیل عملکرد تجارت کردن از FPGA رقمی-سریال (GF (2M) GF (2M ضریب مونتگومری بر اساس LFSR

عنوان انگلیسی
Area/performance trade-off analysis of an FPGA digit-serial GF(2m)GF(2m) Montgomery multiplier based on LFSR
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
25433 2013 8 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Computers & Electrical Engineering, Volume 39, Issue 2, February 2013, Pages 542–549

ترجمه کلمات کلیدی
تجارت کردن - ضریب مونتگومری
کلمات کلیدی انگلیسی
trade-off, Montgomery multiplier
پیش نمایش مقاله
پیش نمایش مقاله  منطقه / تجزیه و تحلیل عملکرد تجارت کردن از FPGA رقمی-سریال (GF (2M) GF (2M ضریب مونتگومری بر اساس LFSR

چکیده انگلیسی

Montgomery Multiplication is a common and important algorithm for improving the efficiency of public key cryptographic algorithms, like RSA and Elliptic Curve Cryptography (ECC). A natural choice for implementing this time consuming multiplication defined on finite fields, mainly over GF(2m)GF(2m), is the use of Field Programmable Gate Arrays (FPGAs) for being reconfigurable, flexible and physically secure devices. FPGAs allow the implementation of this kind of algorithms in a broad range of applications with different area–performance requirements. In this paper, we explore alternative architectures for constructing GF(2m)GF(2m) digit-serial Montgomery multipliers on FPGAs based on Linear Feedback Shift Registers (LFSRs) and study their area–performance trade-offs. Different Montgomery multipliers were implemented using several digits and finite fields to compare their performance metrics such as area, memory, latency, clocking frequency and throughput to show suitable configurations for ECC implementations using NIST recommended parameters. The results achieved show a notable improvement against FPGA Montgomery multiplier previously reported, achieving the highest throughput and the best efficiency.

مقدمه انگلیسی

Public key cryptography [1] is a kind of cryptography used for ensuring the security services of confidentiality, integrity and authentication on digital information. Generally, the security of a public key cryptographic algorithm is based on a conjectured difficult problem, such as integer factorization [2], discrete logarithm [3] or the elliptic curve discrete logarithm (ECDL) [4]. Elliptic Curve Cryptography (ECC) is based on the ECDL problem defined on a mathematical structure called elliptic curve, a set of points satisfying an equation which is defined over a finite field [5] and [6]. The ECC cryptographic algorithms for confidentiality, integrity, and authentication services require arithmetic operations on the elliptic curve such as scalar multiplication, implemented as several additions of points in the elliptic curve. A point addition operation in ECC is implemented using several finite field arithmetic operations, like addition, inversion, division, and multiplication. It has been shown that efficient implementations of ECC are achieved by using projective coordinates [7] to represent the points of the elliptic curve. Under this representation, the point addition operation is implemented using only field additions, subtractions and multiplications. While field additions and subtractions are considered fast operations, multiplications are significantly more time demanding, becoming the bottleneck of cryptographic algorithms like ECDSA [8]. This is the reason why efficient implementation of field multiplication has been one of the main topics studied in recent times. Several algorithms for field multiplication have been proposed [9], one of the most attractive has been the Montgomery algorithm [10]. Several implementations of this algorithm have been reported in the literature, mainly hardware architectures for FPGAs. The Montgomery multiplication algorithm performs several iterations to achieve a field multiplication in a finite field, such as GF(2m)GF(2m). The bit-serial version of this algorithm processes one bit from one of the involved operands at each iteration and delivers the multiplication after m iterations. The digit-serial version reduces the latency of field multiplication from m to ⌈m/D⌉ iterations by processing a group of D bits (digit) at each iteration. However, this last kind of multiplier requires more area resources as D grows, increasing the delay in the critical path. Bit-parallel multipliers are built by taking D = m, performing a field multiplication in only one iteration. Bit-serial multipliers exhibit the highest latency compared to digit-serial and bit parallel multipliers but bit serial multipliers use less area resources and can achieve higher clock frequencies. In most cases, application requirements determine which multiplier configuration is better to use, ranging from a pure bit-serial implementation to a fully parallel one. The digit-serial approach could be a better choice for getting a better performer multiplier compromising area and speed as the application demands. In order to find this better multiplier configuration, the area–performance of Montgomery multiplication can be evaluated by implementing digit-serial multipliers for different digits while analyzing how the area-time (AT) metric is affected. FPGAs are very attractive for this study as they join the flexibility of software and the performance of hardware. The design flow is achieved by using CAD tools and several versions of the circuit can be tested on the same hardware resources, reducing costs and increasing productivity. This capability of FPGAs allows the exploration of different versions of the digit-serial multiplier in order to select the most appropriate according to the application requirements in terms of area resources or performance. In this work we present an area/performance trade-off analysis of a digit-serial Montgomery Multiplier based on a Linear Feedback Shift Register [11] well suited for use in ECC cryptographic algorithms. The multiplier is defined over the finite field GF(2m)GF(2m) using polynomial basis. We have studied this multiplier using different digits and different finite fields currently recommended in standards of ECC by organizations like IEEE [8], NIST [12] and SEC [13]. A related work to the one presented in this paper has been published in [14], that includes an FPGA area–performance trade offs analysis of a GF(2m)GF(2m) “classic” multiplier. Unlike this paper, we are working with GF(2m)GF(2m) multiplication in the Montgomery domain. The algorithm for Montgomery multiplication is quite different to the one studied in [14], and hence, the architectural design and corresponding results achieved here cannot be directly compared. In [11], the complexity of the digit-serial Montgomery multiplier was analyzed theoretically and expressed in terms of the digit D and field size m , and the complexity of hardware designs for bit serial and digit-serial GF(2m)GF(2m) multipliers is presented in terms of ANDs, XORs, latency and critical path delay. On the contrary, the contributions presented in this work are: (i) A GF(2m)GF(2m) Montgomery multiplier implemented in FPGA, for which area/performance trade-off is studied. (ii) An area/performance trade off study of GF(2m)GF(2m) Montgomery multiplier for elliptic curve cryptography. Different configuration for the digit-serial multiplier were considered, using the finite fields m = 193, 233, 239, 277, 409 and 571 and the digits D = 2, 4, 8, 16, 32, and 64. (iii) A comparison against previous FPGA implementations of Montgomery multipliers, in order to demonstrate the advantage of using LFSR in the construction of the multiplier for practical applications. (iv) An evaluation of the GF(2m)GF(2m) digit-serial Montgomery multiplier in practical FPGA implementation using several metrics, such as throughput, efficiency and AT metric. To our knowledge, this is the first work that provides an area/performance trade-off analysis for digit-serial Montgomery multiplier over GF(2m)GF(2m). As an application example, consider the design of a security protocol on chip. Depending on the available area for the whole protocol or the performance it must meet, the study presented in this work allows the designer to compare performance metrics of the multiplier such as area, memory, latency, clocking frequency and throughput, in order to select the most suitable digit that meets the application requirements. The rest of this paper is organized as follows: next section overviews the digit-serial Montgomery Multiplier and its architecture. The results, analysis, and comparison are presented and discussed in Section 3. Finally, the conclusions are pointed out in Section 4.

نتیجه گیری انگلیسی

This work discussed the area/performance trade-offs of digit-serial hardware architectures for GF(2m)GF(2m) Montgomery multipliers implemented in FPGA technology. The main functional core is a Linear Feedback Shift Register (LFSR), which provides to the multiplier architecture a regular structure that allows it to achieve high clock frequencies at the cost of few area resources, obtaining an efficiency and throughput do not previously reported in the literature. The applications of this multiplier are for public key cryptography, particularly Elliptic Curve Cryptography (ECC). Because of this, the finite fields and corresponding irreducible polynomials used for implementation are the ones recommended by NIST, IEEE and SEC. In all cases, the ratio between the area required by the multiplier using the maximum digit (64) and the minimum (2) is about 5.8, while the improvement in the timing for computing a Montgomery multiplication using the greatest digit respect to the minimum is around 30×. The multiplier hardware requirements increase when the digit grows, it is justified because the area time (AT) metric decreases rapidly, obtaining the minimum AT metric for the greater digit. The area/performance trade off study presented in this work provides a useful guide to the designer in order to select the most suitable configuration for the multiplier, 〈m, D〉, compromising area, throughput and efficiency to meet given implementation requirements.