Title :
Efficient Power-Analysis-Resistant Dual-Field Elliptic Curve Cryptographic Processor Using Heterogeneous Dual-Processing-Element Architecture
Author :
Jen-Wei Lee ; Szu-Chi Chung ; Hsie-Chia Chang ; Chen-Yi Lee
Author_Institution :
Dept. of Electron. Eng., Nat. Chiao Tung Univ., Hsinchu, Taiwan
Abstract :
Elliptic curve cryptography (ECC) for portable applications is in high demand to ensure secure information exchange over wireless channels. Because of the high computational complexity of ECC functions, dedicated hardware architecture is essential to provide sufficient ECC performance. Besides, crypto-ICs are vulnerable to side-channel information leakage because the private key can be revealed via power-analysis attacks. In this paper, a new heterogeneous dual-processing-element (dual-PE) architecture and a priority-oriented scheduling of right-to-left double-and-add-always EC scalar multiplication (ECSM) with randomized processing technique are proposed to achieve a power-analysis-resistant dual-field ECC (DF-ECC) processor. For this dual-PE design, a memory hierarchy with local memory synchronization scheme is also exploited to improve data bandwidth. Fabricated in a 90-nm CMOS technology, a 0.4- mm2 160-b DF-ECC chip can achieve 0.34/0.29 ms 11.7/9.3 μJ for one GF(p)/GF(2m) ECSM. Compared to other related works, our approach is advantageous not only in hardware efficiency but also in protection against power-analysis attacks.
Keywords :
CMOS digital integrated circuits; computational complexity; microprocessor chips; private key cryptography; public key cryptography; synchronisation; wireless channels; CMOS technology; DF-ECC chip; ECC functions; computational complexity; crypto-IC; data bandwidth; dedicated hardware architecture; dual-PE design; efficient power-analysis-resistant dual-field elliptic curve cryptographic processor; hardware efficiency; heterogeneous dual-PE architecture; heterogeneous dual-processing-element architecture; information exchange security; local memory synchronization scheme; memory hierarchy; portable application; power-analysis attacks; power-analysis-resistant DF-ECC processor; priority-oriented scheduling; private key; randomized processing technique; right-to-left double-and-add-always EC scalar multiplication; side-channel information leakage; size 90 nm; wireless channels; Algorithm design and analysis; Computer architecture; Elliptic curve cryptography; Hardware; Instruction sets; Processor scheduling; Scheduling; Dual fields; elliptic curve cryptography (ECC); heterogeneous processing-element architecture; parallel computations; power-analysis attacks;
Journal_Title :
Very Large Scale Integration (VLSI) Systems, IEEE Transactions on
DOI :
10.1109/TVLSI.2013.2237930