skip to main content
10.1145/1366110.1366127acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
research-article

Reconfigurable solutions for very-long arithmetic with applications in cryptography

Published:04 May 2008Publication History

ABSTRACT

We present a cryptography-oriented reconfigurable array called CryptoRA that efficiently supports very long-integer addition and subtraction. We first describe the CryptoRA architecture and show that extending the dedicated carry chains of modern FPGAs over the orthogonal direction, followed by merging two FPGA columns to create computing tiles that support both generate and propagate signals of a carry-lookahead network, provides a reduction in operation latency. Then, we show that splitting a tile's Look-Up Table into two halves provides additional benefits in terms of latency and flexibility in using the dedicated generate and propagate chains. According to our estimations, long-integer addition widely used in cryptography is more than 22% faster on CryptoRA than on Virtex-II Pro FPGA. This improvement has a large positive impact on implementing cryptography applications in embedded environments.

References

  1. Altera Corporation, http://www.altera.com/.Google ScholarGoogle Scholar
  2. Altera Corporation, Stratix Device Handbook. Altera Corporation, San Jose, California, January 2006.Google ScholarGoogle Scholar
  3. Thomas Blum and Christof Paar. Montgomery Modular Exponentiation on Reconfigurable Hardware. In Proceedings of the 14th Symposium on Computer Arithmetic, pp. 70--77, Adelaide, Australia, April 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Duncan A. Buell and Kenneth L. Pocek. Custom Computing Machines: An Introduction. Journal of Supercomputing, 9(3):219--230, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Canadian Microelectronics Corporation (CMC Microsystems). http://www.cmc.ca/.Google ScholarGoogle Scholar
  6. Katherine Compton and Scott A. Hauck. Reconfigurable Computing: A Survey of Systems and Software. ACM Computing Surveys (CSUR), 34(2):171--210, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Andre DeHon. Reconfigurable Architectures for General--Purpose Computing. A.I. 1586, Massachusetts Inst. of Technology, Cambridge, Massachusetts, October 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Andre DeHon. Balancing interconnect and computation in a reconfigurable computing array (or, why you don't really want 100% LUT utilization). In 7th ACM/SIGDA Intl Symp. on FPGAs, pp. 69--78, Monterey, California, February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Andre DeHon. The Density Advantage of Configurable Computing. IEEE Computer, 33(4):41--49, April 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Milos D. Ercegovac and Tomas Lang. Digital Arithmetic. Morgan Kaufmann, 2003.Google ScholarGoogle Scholar
  11. James Goodman and Anantha P. Chandrakasan. An Energy--Efficient IEEE 1363--based Reconfigurable Public--KeyGoogle ScholarGoogle Scholar
  12. Cryptography Processor. In The IEEE Intl. Solid--State Circuits Conf., pp. 330--331, 461--462, San Francisco, California, February 2001.Google ScholarGoogle Scholar
  13. James Goodman and Anantha P. Chandrakasan. An Energy--Efficient Reconfigurable Public--Key Cryptography Processor. IEEE J. Solid--State Circuits, 36(11):1808--1820, November 2001.Google ScholarGoogle ScholarCross RefCross Ref
  14. Darrel Hankerson, Alfred Menezes, and Scott Vanstone. Guide to Elliptic Curve Cryptography. Springer--Verlag, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Scott A. Hauck, Matthew M. Hosler, and Thomas W. Fry. High-performance carry chains for FPGA's. IEEE Tran. VLSI Systems, 8(2):138--147, April 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Scott A. Hauck. The Roles of FPGA's in Reprogrammable Systems. Proc. IEEE, 86(4):615--638, April 1998.Google ScholarGoogle ScholarCross RefCross Ref
  17. Gerry Kane and Joseph Heinrich. MIPS RISC Architecture. Prentice-Hall, 2nd edition, September 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Neal Koblitz. Elliptic curve cryptosystem. In Mathematics of Computation, number 48, April 1987.Google ScholarGoogle Scholar
  19. Ruby B. Lee, Zhijie Shi, and Xiao Yang. Efficient Permutation Instructions for Fast Software Cryptography. IEEE Micro, 21(6):56--69, November--December 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Scott Miller, Mihai Sima, and Michael McGuire. Alternatives in Designing Level-Restoring Buffers for Interconnection Networks in Field-Programmable Gate Arrays. Proc. 10th Euromicro Conference on Digital System Design Architectures, Methods and Tools, pp. 138--146, Lubeck, Germany, August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Peter L. Montgomery. Modular multiplication without trial division. In Mathematics of Computation, vol. 44, April 1985.Google ScholarGoogle ScholarCross RefCross Ref
  22. Behrooz Parhami. Computer Arithmetic: Algorithms and Hardware Designs. Oxford University Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Ron L. Rivest, Adi Shamir, and Leonard Adleman. A method for obtaining digital signatures and public--key cryptosystems. Communications of the ACM, 21(2):120--126, February 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Michael Rosing. Implementing Elliptic Curve Cryptography. Manning Publications Co., 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Akashi Satoh, Y. Kobayashi, H. Niijima, Nobuyuki Ooba, Seiji Munetoh, and S. Sone. A High--Speed Small RSA Encryption LSI with Low Power Dissipation. Proc. First Intl. Workshop on Information Security (ISW'97), Tatsunokuchi, Ishikawa, Japan, September 1997, volume 1396 of Lecture Notes in Computer Science, pp. 174--187, Springer, Berlin. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. David Seal. ARM Architecture Reference Manual. Addison--Wesley, 2nd edition, December 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Shamus Software Ltd. Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL), 2005. http://www.shamus.ie.Google ScholarGoogle Scholar
  28. Douglas R. Stinson. Cryptography: Theory and Practice. Chapman & Hall/CRC, 3rd edition, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Wade Trappe and Laurence C. Washington. Introduction to Cryptography with Coding Theory. Prentice-Hall, 2nd edition, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Xilinx Corporation. Virtex--II Platform FPGAs: Complete Data Sheet. Data Sheet DS031, San Jose, California, November 2007.Google ScholarGoogle Scholar
  31. Xilinx Incorporated., http://www.xilinx.com/.Google ScholarGoogle Scholar

Index Terms

  1. Reconfigurable solutions for very-long arithmetic with applications in cryptography

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                GLSVLSI '08: Proceedings of the 18th ACM Great Lakes symposium on VLSI
                May 2008
                480 pages
                ISBN:9781595939999
                DOI:10.1145/1366110

                Copyright © 2008 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 4 May 2008

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate312of1,156submissions,27%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader