Cryptology ePrint Archive: Report 2016/487

A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems

Amine MRABET, Nadia EL-MRABET, Ronan LASHERMES, Jean Baptiste RIGAUD, Belgacem BOUALLEGUE, Sihem MESNAGER and Mohsen MACHHOUT

Abstract: The arithmetic in a finite field constitutes the core of Public Key Cryptography like RSA, ECC or pairing-based cryptography. This paper discusses an efficient hardware implementation of the Coarsely Integrated Operand Scanning method (CIOS) of Montgomery modular multiplication combined with an effective systolic architecture designed with a Two-dimensional array of Processing Elements. The systolic architecture increases the speed of calculation by combining the concepts of pipelining and the parallel processing into a single concept. We propose the CIOS method for the Montgomery multiplication using a systolic architecture. As far as we know this is the first implementation of such design. The proposed architectures are designed for Field Programmable Gate Array platforms. They targeted to reduce the number of clock cycles of the modular multiplication. The presented implementation results of the CIOS algorithms focuses on different security levels useful in cryptography. This architecture have been designed in order to use the flexible DSP48 on Xilinx FPGAs. Our architecture is scalable and depends only on the number and size of words. For instance, we provide results of implementation for 8, 16, 32 and 64 bit long words in 33, 66, 132 and 264 clock cycles. We highlight the fact that for a given number of word, the number of clock cycles is constant.

Category / Keywords: Hardware Implementation, Modular Multiplication, Montgomery Algorithm, CIOS method, Systolic Architecture, DSP48

Date: received 20 May 2016, last revised 20 May 2016

Contact author: amine_mrabet_eniso at yahoo fr

Available format(s): PDF | BibTeX Citation

Version: 20160520:122352 (All versions of this report)

Short URL: ia.cr/2016/487

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]