首页    期刊浏览 2024年09月12日 星期四
登录注册

文章基本信息

  • 标题:Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptography Implementation
  • 本地全文:下载
  • 作者:Marisa Widyastuti Paryasto ; Budi Rahardjo ; Fajar Yuliawan
  • 期刊名称:Journal of ICT Research and Applications
  • 印刷版ISSN:2337-5787
  • 电子版ISSN:2338-5499
  • 出版年度:2012
  • 卷号:6C
  • 期号:1
  • DOI:10.5614/itbj.ict.2012.6.1.4
  • 出版社:Institut Teknologi Bandung
  • 摘要:Implementing a secure cryptosystem requires operations involving hundreds of bits. One of the most recommended algorithm is Elliptic Curve Cryptography (ECC). The complexity of elliptic curve algorithms and parameters with hundreds of bits requires specific design and implementation strategy. The design architecture must be customized according to security requirement, available resources and parameter choices. In this work we propose the use of composite field to implement finite field multiplication for ECC implementation. We use 299-bit keylength represented in GF((213)23) instead of in GF(2299). Composite field multiplier can be implemented using different multiplier for ground-field and for extension field. In this paper, LUT is used for multiplication in the ground-field and classic multiplieris used for the extension field multiplication. A generic architecture for the multiplier is presented. Implementation is done with VHDL with the target device Altera DE2. The work in this paper uses the simplest algorithm to confirm the idea that by dividing field into composite, use different multiplier for base and extension field would give better trade-off for time and area. This work will be the beginning of our more advanced further research that implements composite-field using Mastrovito Hybrid, KOA and LUT.
  • 关键词:composite field; cryptography; elliptic curve; finite field; multiplier; security
国家哲学社会科学文献中心版权所有