01whole.pdf (6.25 MB)
Download file

Hardware implementation of elliptic curve cryptography based on residue number systems

Download (6.25 MB)
thesis
posted on 29.03.2022, 01:40 by Mohamad Ali Mehrabi
In today's technology, a sheer number of Internet of things applications use hardware security modules for secure communications. The widely used algorithms in security modules, for example, digital signatures and key agreement, are based upon elliptic curve cryptography (ECC). In many IoT applications, such as intelligent transportation systems and distributed control systems, thousands of safety messages need to be signed and verified within a very short time frame. Considerable research has been conducted in the design of fast elliptic curve arithmetic on finite fields using residue number systems (RNS). This thesis investigates fast hardware implementations for RNS elliptic curve cryptography (ECC) co-processors. Our focus is to speed up the ECC point multiplication operation by exploiting the properties of the residue number system (RNS). The RNS consists of independent and carry-free small-sized integer channels that make it suitable for long-integer arithmetic. By harnessing the RNS properties, hardware parallelism, and utilising different point multiplication algorithms, we designed a low-latency ECC point multiplication co-processor for the standard elliptic curves SECP256K1, ED25519, and Brainpool256r1 which are widely used in the industry. This thesis contributes to the field of hardware cryptography as follows: Two new architectures for RNS modular reduction are proposed. The first improvement is on the RNS Montgomery reduction algorithm in which its FPGA implementation utilises fewer hardware resources and is also much faster in terms of speed compared to the literature. In addition to the RNS modular reduction algorithm, a new modular reduction based on the sum of residues (SOR) is proposed. The SOR algorithm is highly parallelisable. Two variants of the SOR algorithm with different levels of parallelism are implemented on FPGA. Furthermore, the elliptic curve group law operations are optimised for parallel computation and are used in the design of an RNS ECC co-processor. This thesis analyses the security of RNS GLV ECC co-processors with respect to side-channel, power data analysis by making use of machine and deep learning algorithms. Finally, suitable countermeasures are proposed to make such co-processors immune to side-channel attacks -- abstract.

History

Table of Contents

1. Introduction -- 2. Background -- 3. RNS arithmetic hardware -- 4. RNS elliptic curve point multiplication hardware design -- 5. Side-channel power analysis of the GLV RNS ECC -- 6. Conclusion -- Appendices -- References.

Notes

Bibliography: pages 207-215 Theoretical thesis.

Awarding Institution

Macquarie University

Degree Type

Thesis PhD

Degree

PhD, Macquarie University, Faculty of Science and Engineering, Department of Computing

Department, Centre or School

Department of Computing

Year of Award

2020

Principal Supervisor

Alireza Jolfaei

Rights

Copyright Mohamad Ali Mehrabi 2020. Copyright disclaimer: http://mq.edu.au/library/copyright

Language

English

Extent

1 online resource (241 pages)

Former Identifiers

mq:72395 http://hdl.handle.net/1959.14/1284579