Table 6: Comparison between our ECC design and related work over GF(2
163
).
References Technology Frequency Clock cycles Time
(MHz) (ms)
This work Kintex-7 306.48 325564 1.06
Ghanmy (Ghanmy et al., 2014) Virtex-II 24 54138 2.26
Reaz (Reaz et al., 2012) FLEX10KE 43 640700 14.9
Hasan (Hassan and Benaissa, 2010) Spartan-3 76 205200 2.7
Machhout (Machhout et al., 2010) Virtex-II 167.84 347425 2.07
Shieh (Shieh et al., 2009) V1000E - - 2.55
Park (Park and Hwang, 2005) V1000E 44 134090 3.05
Smyth (Smyth et al., 2006) 0.13µmASIC 166 526280 3.17
on the performance between them. An ECC processor
over GF(2
163
) for wireless sensor networks (WSN)
is proposed in (Ghanmy et al., 2014), and it requires
2.26 ms to achieve a point multiplication. The ECC
processor proposed by Reaz (Reaz et al., 2012) pro-
vides a result for the field GF(2
163
), and their de-
sign takes 14.9 ms to compute a point multiplica-
tion. Our implemented result is almost 14 times the
speed of Reaz (Reaz et al., 2012) but our presented
result is not in the same platform. Hasan (Hassan and
Benaissa, 2010), Machhout (Machhout et al., 2010),
and Sheih (Shieh et al., 2009) implemented ECC pro-
cessors over GF(2
163
), and their designs require 2.7
ms, 2.07 ms, and 2.55 ms respectively. Our imple-
mented result is almost double the speed of that of
Hasan, Maccout, and Sheih. Park (Park and Hwang,
2005) and Smyth (Smyth et al., 2006) developed ECC
processors over GF(2
163
) in different platforms but
their cryptographic processors require more compu-
tation time than our design. Our ECC processor over
GF(2
163
) takes 1.06 ms to accomplish a point multi-
plication. We have also achieved a higher frequency
than other cryptographic processors. From the com-
parison and performance analysis in Table 6, our ECC
processor over GF(2
163
) provides better performance
than others.
6 CONCLUSIONS
A high-performance ECC processor over GF(2
163
)
has been implemented using FPGA technology. The
binary method (double-and-add) point-multiplication
algorithm using an affine coordinate system was
used for this hardware implementation. An efficient
polynomial-basis multiplication and inversion algo-
rithm was developed for performing elliptic curve PD
and PA operations and hence ECC processor. The
implemented design is optimized by using different
optimization techniques such as balancing the PD
and PA architecture, parallelization in operations, and
pre-computations for obtaining high performance on
an FPGA compared to other designs. In GF(2
163
),
we can achieve a point multiplication in 1.06 ms at
306.48 MHz in Kintex-7 (28-nm) devices, which is
the fastest hardware implementation result. The pro-
posed design provides nearly 50% better delay per-
formance than recent implementations. Our imple-
mented design is also area-efficient as it contains only
2253 slices without using any DSP slices. Based on
the overall performance analysis and comparisons of
different ECC processors over the binary field F
163
,
it can be concluded that this design provides better
performance than others in terms of the area and the
timing.
REFERENCES
Chelton, W. and Benaissa, M. (2008). Fast elliptic curve
cryptography on FPGA. IEEE Transactions on Very
Large Scale Integration (VLSI) Systems, 16(2):198–
205.
Ghanmy, N., Fourati, L. C., and Kamoun, L. (2014). El-
liptic curve cryptography for WSN and SPA attacks
method for energy evaluation. Journal of Networks,
9(11):2943–2950.
Guo, J.-H. and Wang, C.-L. (1998). Systolic array imple-
mentation of euclid’s algorithm for inversion and divi-
sion in GF(2
m
). IEEE Trans. Comput., 47(10):1161–
1167.
Hankerson, D., Menezes, A. J., and Vanstone, S. (2003).
Guide to Elliptic Curve Cryptography. Springer-
Verlag New York, Inc., Secaucus, NJ, USA.
Hassan, M. N. and Benaissa, M. (2010). Efficient time-area
scalable ECC processor using µ-coding technique. In
Third International Workshop, WAIFI, Arithmetic of
Finite Fields, LNCS 6087, pages 250–268.
IEEE (2000). IEEE standard specifications for public-key
cryptography. IEEE Std 1363-2000, pages 1–228.
Koblitz, N. (1987). Elliptic curve cryptosystems. In Math.
Computation, volume 48 (177), pages 203–209.
High-performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF(2
163
)
421