Low-Complexity Multiplier Architectures for Single and Hybrid-Double Multiplications in Gaussian Normal Bases

The extensive rise in the number of resource constrained wireless devices and the needs for secure communications with the servers imply fast and efficient cryptographic computations for both parties. Efficient hardware implementation of arithmetic operations over finite field using Gaussian normal basis is attractive for public key cryptography as it provides free squarings. In this paper, we first present two low-complexity digit-level multiplier architectures. It is shown that the proposed multipliers outperform the existing Gaussian normal basis (GNB) multiplier structures available in the literature. Then, for the first time, using these two architectures, we propose a new digit-level hybrid multiplier which performs two successive multiplications with the same latency as the one for one multiplication. We have studied the efficiency of the proposed hybrid architecture in terms of area and time delay for different digit sizes. The main advantage of this new hybrid architecture is to speed up exponentiation and point multiplication whenever double-multiplication is required and the traditional schemes fail due to the data dependencies. We have investigated the applicability of the proposed hybrid structure to reduce the latency of exponentiation-based cryptosystems. Our analysis and timing results show that the expected acceleration in double-exponentiation is considerable. Prototypes of the presented low-complexity multiplier architectures and the proposed hybrid architecture are implemented and experimental results are presented.

[1]  Kris Gaj,et al.  Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography , 2004, CHES.

[2]  T. Itoh,et al.  A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases , 1988, Inf. Comput..

[3]  Arash Reyhani-Masoleh Efficient algorithms and architectures for field multiplication using Gaussian normal bases , 2006, IEEE Transactions on Computers.

[4]  Michele Elia,et al.  On the Inherent Space Complexity of Fast Parallel Multipliers for GF(2/supm/) , 2002, IEEE Trans. Computers.

[5]  Dieter Gollmann,et al.  Algorithm engineering for public key algorithms , 1989, IEEE J. Sel. Areas Commun..

[6]  Ted Taekyoung Kwon,et al.  Fast Exponentiation Using Split Exponents , 2011, IEEE Transactions on Information Theory.

[7]  Majid Ahmadi,et al.  A Word-Level Finite Field Multiplier Using Normal Basis , 2011, IEEE Transactions on Computers.

[8]  Tim Güneysu,et al.  Breaking Elliptic Curve Cryptosystems Using Reconfigurable Hardware , 2010, 2010 International Conference on Field Programmable Logic and Applications.

[9]  Dieter Gollmann,et al.  Symmetry and Duality in Normal Basis Multiplication , 1988, AAECC.

[10]  A. Menezes,et al.  Applications of Finite Fields , 1992 .

[11]  Gui Liang Feng A VLSI Architecture for Fast Inversion in GF(2^m) , 1989, IEEE Trans. Computers.

[12]  Reza Azarderakhsh,et al.  A Modified Low Complexity Digit-Level Gaussian Normal Basis Multiplier , 2010, WAIFI.

[13]  Soonhak Kwon,et al.  FPGA implementation of high performance elliptic curve cryptographic processor over GF , 2008, J. Syst. Archit..

[14]  Dingyi Pei,et al.  A VLSI DEsign for Computing Exponentiations in GF(2^m) and Its Application to Generate Pseudorandom Number Sequences , 1990, IEEE Trans. Computers.

[15]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[16]  V.K. Bhargava,et al.  A Modified Massey-Omura Parallel Multiplier for a Class of Finite Fields , 1993, IEEE Trans. Computers.

[17]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[18]  Jagdish Chandra Patra,et al.  Concurrent Error Detection in Bit-Serial Normal Basis Multiplication Over ${\rm GF}(2^{m})$ Using Multiple Parity Prediction Schemes , 2010, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[19]  M. Anwar Hasan,et al.  Efficient digit-serial normal basis multipliers over binary extension fields , 2004, TECS.

[20]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[21]  Chiou-Yng Lee,et al.  Digit-Serial Gaussian Normal Basis Multiplier over GF(2m) Using Toeplitz Matrix-Approach , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.

[22]  Kimmo Järvinen,et al.  On Parallelization of High-Speed Processors for Elliptic Curve Cryptography , 2008, IEEE Trans. Very Large Scale Integr. Syst..

[23]  Ian F. Blake,et al.  Low complexity normal bases , 1989, Discret. Appl. Math..

[24]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[25]  Gerald E. Sobelman,et al.  Improved VLSI designs for multiplication and inversion in GF(2/sup M/) over normal bases , 2000, Proceedings of 13th Annual IEEE International ASIC/SOC Conference (Cat. No.00TH8541).

[26]  Gordon B. Agnew,et al.  An implementation for a fast public-key cryptosystem , 2004, Journal of Cryptology.

[27]  C. Chiou,et al.  Scalable and Systolic Architecture for Computing Double Exponentiation Over GF(2m) , 2006 .

[28]  Chiou-Yng Lee Concurrent error detection architectures for Gaussian normal basis multiplication over GF(2m) , 2010, Integr..

[29]  M. Anwar Hasan,et al.  A New Construction of Massey-Omura Parallel Multiplier over GF(2m) , 2002, IEEE Trans. Computers.

[30]  Berk Sunar,et al.  An Efficient Optimal Normal Basis Type II Multiplier , 2001, IEEE Trans. Computers.

[31]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[32]  Carl Eklund,et al.  National Institute for Standards and Technology , 2009, Encyclopedia of Biometrics.

[33]  N. Koblitz Elliptic curve cryptosystems , 1987 .