A versatile montgomery multiplier architecture with characteristic three support

Öztürk, Erdinç and Sunar, Berk and Savaş, Erkay (2009) A versatile montgomery multiplier architecture with characteristic three support. Computers & Electrical Engineering, 35 (1). pp. 71-85. ISSN 0018-9340

This is the latest version of this item.

[thumbnail of This is a RoMEO green publisher - Author can archive publisher's version/PDF] PDF (This is a RoMEO green publisher - Author can archive publisher's version/PDF)
versatile_mult_GF3support.pdf

Download (272kB)

Abstract

We present a novel unified core design which is extended to realize Montgomery multiplication in the fields GF(2(n)), GF(3(m)). and GF(p). Our unified design supports RSA and elliptic Curve schemes, as well as the identity-based encryption which requires a pairing computation on an elliptic Curve. The architecture is pipelined and is highly scalable. The unified core utilizes the redundant signed digit representation to reduce the critical path delay. While the carry-save representation used in classical Unified architectures is only good for addition and Multiplication operations, the redundant signed digit representation also facilitates efficient computation of comparison and subtraction operations besides addition and multiplication. Thus, there is no need for a transformation between the redundant and the non-redundant representations of held elements, which Would be required in the classical unified architectures to realize the subtraction and comparison operations. We also quantify the benefits of the unified architectures in terms of area and critical path delay. We provide detailed implementation results. The metric shows that the new unified architecture provides an improvement over a hypothetical non-unified architecture of at least 24.88%, while the improvement over a classical unified architecture is at least 32.07%. (C) 2008 Elsevier Ltd. All rights reserved.
Item Type: Article
Uncontrolled Keywords: Montgomery multiplication; Public key cryptography; Finite fields; Identity-based cryptography
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7800-8360 Electronics > TK7885-7895 Computer engineering. Computer hardware
Divisions: Faculty of Engineering and Natural Sciences
Depositing User: Erkay Savaş
Date Deposited: 02 Dec 2009 12:28
Last Modified: 25 May 2011 14:13
URI: https://research.sabanciuniv.edu/id/eprint/12977

Available Versions of this Item

Actions (login required)

View Item
View Item