2018
DOI: 10.1145/3231743
|View full text |Cite
|
Sign up to set email alerts
|

Reconfigurable Hardware Architecture for Authenticated Key Agreement Protocol Over Binary Edwards Curve

Abstract: In this article, we present a high-performance hardware architecture for Elliptic curve based (authenticated) key agreement protocol “Elliptic Curve Menezes, Qu and Vanstone” (ECMQV) over Binary Edwards Curve (BEC). We begin by analyzing inversion module on a 251-bit binary field. Subsequently, we present Field Programmable Gate Array (FPGA) implementations of the unified formula for computing elliptic curve point addition on BEC in affine and projective coordinates and investigate the relative performance of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 37 publications
0
16
0
Order By: Relevance
“…This is due to the fact that our design uses a 251-bit finite field while those in [13,26] use 163-bit and 233-bit finite fields, respectively. Moreover, the proposed design consumes a larger area but outperforms the BEC design [19] in both speed and area-time (AT) metrics. Furthermore, our proposed BEC PM design yields a better performance when compared to the earlier reported BEC designs [13,19,23,24,26,27].…”
Section: Performance Comparison With State Of the Artmentioning
confidence: 99%
See 2 more Smart Citations
“…This is due to the fact that our design uses a 251-bit finite field while those in [13,26] use 163-bit and 233-bit finite fields, respectively. Moreover, the proposed design consumes a larger area but outperforms the BEC design [19] in both speed and area-time (AT) metrics. Furthermore, our proposed BEC PM design yields a better performance when compared to the earlier reported BEC designs [13,19,23,24,26,27].…”
Section: Performance Comparison With State Of the Artmentioning
confidence: 99%
“…Moreover, it is intrinsically resistant to a simple power analysis (SPA). When ECPM adopts the same module for PD and PA, the bit pattern of the private key cannot be revealed by SPA [19].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…On the one hand, this protocol offers key authentication and transmission confidentiality. On the other hand, MQV is vulnerable to the attack of unknown key sharing [18].…”
Section: Related Workmentioning
confidence: 99%
“…Other models (Hessian, Edward and Huff) contain built-in unified PA laws to provide a resistance against SPA attacks [8], [9], [17]. Furthermore, the use of double and add PM algorithm in Hessian, Edward and Huff models provides some additional security [18], [19]. It is important to note that the preventive models of Hessian and Edward provide higher throughputs as compared to BHC model.…”
Section: Introductionmentioning
confidence: 99%