Paper 2019/1039

Accelerated V2X provisioning with Extensible Processor Platform

Henrique S. Ogawa, Thomas E. Luther, Jefferson E. Ricardini, Helmiton Cunha, Marcos Simplicio Jr., Diego F. Aranha, Ruud Derwig, and Harsh Kupwade-Patil


With the burgeoning Vehicle-to-Everything (V2X) communication, security and privacy concerns are paramount. Such concerns are usually mitigated by combining cryptographic mechanisms with suitable key management architecture. However, cryptographic operations may be quite resource-intensive, placing a considerable burden on the vehicle’s V2X computing unit. To assuage this issue, it is reasonable to use hardware acceleration for common cryptographic primitives, such as block ciphers, digital signature schemes, and key exchange protocols. In this scenario, custom extension instructions can be a plausible option, since they achieve fine-tune hardware acceleration with a low to moderate logic overhead, while also reducing code size. In this article, we apply this method along with dual-data memory banks for the hardware acceleration of the PRESENT block cipher, as well as for the $F_{2^{255}-19}$ finite field arithmetic employed in cryptographic primitives based on Curve25519 (e.g., EdDSA and X25519). As a result, when compared with a state-of-the-art software-optimized implementation, the performance of PRESENT is improved by a factor of 17 to 34 and code size is reduced by 70%, with only a 4.37% increase in FPGA logic overhead. In addition, we improve the performance of operations over Curve25519 by a factor of ~2.5 when compared to an Assembly implementation on a comparable processor, with moderate logic overhead (namely, 9.1%). Finally, we achieve significant performance gains in the V2X provisioning process by leveraging our hardware-accelerated cryptographic primitives

Available format(s)
Cryptographic protocols
Publication info
Preprint. MINOR revision.
V2XSCMSCurve25519PRESENT cipherDual-Data Memory BanksExtensible Processor
Contact author(s)
harsh patil @ lge com
hkupwade @ gmail com
henrique1 ogawa @ lge com
ogawa henrique @ gmail com
2019-09-18: received
Short URL
Creative Commons Attribution


      author = {Henrique S.  Ogawa and Thomas E.  Luther and Jefferson E.  Ricardini and Helmiton Cunha and Marcos Simplicio Jr. and Diego F.  Aranha and Ruud Derwig and Harsh Kupwade-Patil},
      title = {Accelerated {V2X} provisioning with Extensible Processor Platform},
      howpublished = {Cryptology ePrint Archive, Paper 2019/1039},
      year = {2019},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.