SlideShare a Scribd company logo
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
145
ELLIPTIC CURVE SCALAR MULTIPLIER USING
KARATSUBA
Ashna Paul1
, Divya.S2
1
M.Tech VLSI & Embedded Systems, ECE, SNGCE, Ernakulam, India
2
Assistant Professor, ECE, SNGCE, Ernakulam, India
ABSTRACT
Elliptic Curve Cryptography (ECC) provides similar level of security to conventional integer-based public-key
algorithms, but with much shorter keys. ECC over binary field is of special interest because the operations in binary field
are thought more space and time efficient. However, the software implementations of ECC over binary that are used in
small computing devices such as sensor nodes. It replaces RSA because of its increased security with lesser number of
key bits. Elliptic Curve scalar multiplication module will be available in majority of secure communication systems. The
most important operation in Elliptic Curve Cryptosystem is the computation of scalar multiplication using karatsuba
multiplier. In scalar multiplication of kP for given integer k and point P on elliptic curve. This work aims to design and
implement elliptic curve scalar multiplier on a single field programmable gate array (FPGA).The hardware complexity is
reduced using polynomial basis presentation of finite field and projective co-ordinate representation of elliptic curves.
Keywords: Classical Multiplier, Cryptography, FPGA, Galois Multiplier I.
I. INTRODUCTION
Elliptic Curve Cryptography (ECC), proposed independently in 1985 by Neal Koblitz [1] and VictorMiller [2],
has been used in cryptographic algorithms for a variety of security purposes such as key exchangeand digital signature.
Compared to traditional integer based public-key algorithms, ECC algorithms canachieve the same level of security with
much shorter keys. For example, 160-bit Elliptic-curve DigitalSignature Algorithm (ECDSA) has a security level
equivalent to 1024-bit Digital Signature Algorithm(DSA) [3]. Because of the shorter key length, ECC algorithms run
faster, require less space, and consumeless energy. These advantages make ECC a better choice of public-key
cryptography, especially in resource constrained systems such as sensor nodes and mobile devices for pervasive
computing Commonly-used elliptic curves are defined in either a prime field GF(p) or a finite field of characteristic
twoGF(2m), which is also called a binary field [13]. The elliptic curves over binary field are of special interest
tocryptography because the operations in a binary field are faster and easier to implement than those in primefields. We
will focus on ECC over binary field in this paper. This is especially interesting for high performance system because of
its carry free property. To reduce the complexity of simple karatsuba Multiplier, multiplier with less complexity over GF
(2m
) based on simple and classical Karatsuba Multiplier is used. Furthermore, the experimental results on FPGAs for
simple Karatsuba Multiplier and proposed karatsuba multiplier were shown and the comparison table is provided. In the
first part of the paper we present our implementation of an Elliptic Curve scalarmultiplier is based on the projective
coordinate system [5] and the Karatsuba [2] algorithm. The second part of the paper discusses our implementations of the
important mathematical background.
INTERNATIONAL JOURNAL OF ELECTRONICS AND
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 5, Issue 12, December (2014), pp. 145-151
© IAEME: http://www.iaeme.com/IJECET.asp
Journal Impact Factor (2014): 7.2836 (Calculated by GISI)
www.jifactor.com
IJECET
© I A E M E
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
146
II. PRELIMINARIES
When defined in a binary field, an elliptic curve can be represented by y2
+ x•y = x3
+ a•x2
+ b, (1) where a and
b are constants in GF(2m
) and b ≠ 0. The set E(GF(2m
)) includes all the points on the curve and aspecial point Ο, which
is defined as the identity element For any point P = (x, y) in E, we have:P + Ο = Ο + P = P,
Algorithm 1: Elliptic Curve Scalar Multiplier
Input : An integer k ¹ 0 of length l bits and base point P
Output : Q = kP
1. begin
2. Q = O
3. for i = l - 2 downto 0 do
4. Q = Double(Q)
5. if k = 0 then
6. Q = Add(Q, P)
7. end
The cost of an inversion in affine coordinates is much more expensive in scalar multiplication . Inversions can
be reduced by using a projective coordinator representation. A point P in projective coordinates is represented using
three coordinates. In Lopez Dahab (LD) projective coordinates representation is given by
Y2
+ XYZ = X 3
Z + aX2
Z2
+ bZ4
(1)
The equation for point addition in LD coordinate for the projective point P = (X1, Y1, Z1) and the affine point Q
(x2, y2) is shown in (1). The result is the point on the curve
(P + Q) = (X3, Y3, Z3)
A = y2 · Z2
+ Y1
B = x2
· Z1 + X1
C = Z1 · B,
D = B2 · (C + a · Z12)
Z3 = C2
, E = A · C
X3 = A2
+ D + E,
F = X3
+x2
· Z3
G = (x2 + y2) · Z 3
Y3 = (E + Z3) · F + G.
To make it more efficient the scalar multiplication is the main operation in elliptic curve cryptography.
Scalarmultiplication involves plenty of point addition and point doubling. In affine coordinates each point addition
anddoubling involves a multiplicative inverse operation. Multiplicative inverse is a costly operation in finite fieldsTwo
types of operations are done in finite field. They are prime field F(q) and binary field F(2m). Representing the points in
projective coordinate systems can be eliminated the multiplicative inverse operation in point addition and point doubling
and thereby increasing the efficiency of point multiplication operation. Before point multiplication the projective
coordinate in elliptic curve to convert the given point in affine coordinate. Then projective coordinate convert it back to
affine coordinate after point multiplication. The entire process requires only one multiplicative inverse operation. The
operation in projective coordinate involves more scalar multiplication than in affine coordinate. ECC on projective
coordinate will be efficient than affine coordinates .when the implementation of scalar multiplication using projective is
much faster than multiplicative inverse operation.
III. MATHEMATICAL BACKGROUND
A finite field is also known as a Galois field. A Galois field in which the elements can take q is the prime
number different values is referred to as GF(q). The formal properties of a finite field are:
(a) There are two defined operations, namely point addition and point multiplication.
(b) The result of adding or multiplying two elements from the field is always an element in the finite field.
(c) One element of the field is the element zero, such that a + 0 = a for any element a in the
field.
(d) One element of the field is unity, so a • 1 = a for any element a in the field.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
147
(e) For every element a in the field, there is an additive inverse element -a, such that a + ( - a) = 0. This allowsthe
operation of subtraction to be defined as addition of the inverse.
(f) For every non-zero element d in the field there is a multiplicative inverse element d-1 such that d.d-1= 1. Thisallows
the operation of division to be defined as multiplication by the Inverse.
(g) The associative [a + (b + c) = (a + b) + c, a • (b • c) = [(a • b) • c], commutative [a + b = b + a, a • b = b • a], and
distributive [a • (b + c) = a • b + a • c] laws apply. These properties cannot be satisfied for all possible finitefield. They
can, however, be satisfied if the field size is an prime number or any integer power of a prime. If theirreducible
polynomial in binary field implementation is chosen to be trinomial the implementation of ECC on binary field can be
made efficient than the prime field implementation. NIST specified domain parameters, theirreducible polynomials are
either trinomial or pentanomial. These chosen polynomials cause the polynomial reduction in binary field to run much
faster than the modular reduction in prime field. Irreducible polynomial is a polynomial of degree m that cannot be
expressed as the product of two polynomials of lesser degree. If in any polynomial arithmetic operation the resultant
polynomial is having degree greater than or equal to m, it is reduced to a polynomial of degree less than m by the
irreducible polynomial.
A. Point Addition
Point addition is the addition of two points J and K on an elliptic curve to obtain another point L on the same
elliptic curve.
Fig 1: Point Addition
Consider two points J and K on an elliptic curve as shown in figure (a). If K ≠ -J then a line drawn through the
points J and K will intersect the elliptic curve at exactly one more point –L. The reflection of the point –L with respect to
xaxis gives the point L, which is the result of addition of points J and K. Thus on an elliptic curve L = J + K. If K = -J the
line through this point intersect at a point at infinity O. Hence J + (-J) = O. This is shown in figure (b). O is the additive
identity of the elliptic curve group. A negative of a point is the reflection of that point with respect to x-axis.
Consider two distinct points J and K such that J = (xJ, yJ) and K = (xK, yK) Let L = J + K where L = (xL, yL), then
xL = s2 - xJ – XkyL = -yJ + s (xJ – xL) s = (yJ – yK)/(xJ – xK), s is the slope of the line through J and K. If K = -J i.e.
K = (xJ, -yJ) then J + K = O. where O is the point at infinity. If K = J then J + K = 2J then point doubling equations are
used. Also J + K = K + J.
B. Point Doubling
Point doubling is the addition of a point J on the elliptic curve to itself to obtain another point L on the same
ellipticcurve To double a point J to get L, i.e. to find L = 2J, consider a point J on an elliptic curve as shown in figure
(a).If y coordinate of the point J is not zero then the tangent linea J will intersect the elliptic curve at exactly one more
point–L. The reflection of the point –L with respect to x-axisgives the point L, which is the result of doubling the point
J.Thus L = 2J. If y coordinate of the point J is zero then thetangent at this point intersects at a point at infinity O. Hence
2J = O when yJ = 0. This is shown in figure (2)
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
148
Fig 2: Point Doubling
Consider a point J such that J = (xJ, yJ), where yJ≠ 0 Let L = 2J where L = (xL, yL), Then
xL = s2 – 2xJ
yL = -yJ + s(xJ - xL)
s = (3xJ+ a) / (2yJ), s is the tangent at point J and a is one of the parameters chosen with the lliptic curve .If yJ = 0 then
2J = O, where O is the point at infinity.
IV. PROPOSED METHDOLOGY
Finite field multiplication of two elements in the field (2m)is defined a C(x) = A(x) · B(x)mod P(x) . where
C(x), A(x),and B(x) are in GF(2m) and P(x) is the irreduciblepolynomial that generates the field GF(2m).
Implementingthe multiplication requires two steps. First, the polynomialproduct C′(x) = A(x) · B(x) is determined, then
the modulooperation is done on C′(x). The Karatsuba multiplier uses adivide and conquers approach to multiply A(x) and
B(x). Them term polynomials are recursively split into two. Witheach split the size of the multiplication required
reducesby half.In the Karatsuba multiplier, the m bit multiplicands A(x)and B(x) represented in polynomial basis are
split as shownin Equation 2 For brevity, the equations that followrepresent the polynomials Ah(x), Al(x), Bh(x), and
Bl(x) byAh ,A l, Bh, and Bl respectively.
A(x) = Ahxm/2
+ Al
B(x) = Bhxm/2
+ Bl
The multiplication is then done using three m/2 bitmultiplications
C′(x) = (Ahxm/2
+ Al)(Bhxm/2
+ Bl)
= AhBhxm
+ (AhBl + AlBh)xm/2
+ AlBl
= AhBhxm
+ ((Ah + Al)(Bh + Bl) + AhBh +AlBl)xm/2
+ AlBl (2)
The Karatsuba multiplier can be applied recursively to eachm/2 bit multiplication . Ideally this multiplier is best
suitedwhen mis a power of 2, this allows the multiplicands to bebroken down until they reach 2 bits. The final
recursionconsisting of 2 bit multiplications can be achieved by ANDgates. Such a multiplier with m a power of 2 is
called thebasic Karatsuba multiplier.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
149
Fig:3: bit parallel karatsuba multiplier
The classical Karatsuba multiplier is more efficient forsmall sizes of multiplicands, while the bit parallel
Karatsuba multiplier is efficient for large multiplicands. In our proposed Karatsuba multiplier, all recursions are done
usingthe the bit parallel Karatsuba multiplier except the finalrecursion. The final recursion is done using a classical
Karatsuba multiplier when the multiplicands have a size lessthan 29 bits. The initial recursions using the Simple
Karatsuba multiplier result in low gate count, while the finalrecursion using the classical Karatsuba multiplier results in
low LUT requirements. For a163-bit proposed Karatsuba multiplier as shown in Figure 1, the initial four recursions are
done using the Simple Karatsuba multiplier, while the final recursion is done with 20-bit and 21-bit General Karatsuba
multipliers.
Fig 4: proposed karatsuba multiplier
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
150
V. COMPARISON
The summary of the comparison between two scalar multipliers is tabulated as shown below. From the table the
conclusion is proposed karatsuba multiplier has an area efficient design. That is, the second one has almost considerable
reduction in area in terms of total equivalent gate count.
TABLE: COMPARISON
a. AREA ANALYSIS
The synthesis report generated by the Xilinx ISE software tool can be used to analyze the area utilized by the
two versions of the Montgomery karatsuba scalar multiplier. Device utilization summary is shown here for comparison.
This report includes total number of 4 input LUTs, flipflops, the equivalent gate count etc.
b. SIMULATION RESULT FOR SCALAR MULTIPLIER
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
151
V. CONCLUSION
The table the conclusion is proposed karatsuba multiplier has an area efficient design. That is, the second one
has almost considerable reduction in area in terms of total equivalent gate count. The most important factorcontributing
the performance is the finite field multiplication and finite field inversion. A Karatsuba multiplier is proposed for finite
field multiplication, which has been shown to possess the best area time product compared to reported Karatsuba
implementations. The Karatsuba multiplier is a recursive algorithm which does the initial recursions using the simple
Karatsuba multiplier, while the final recursion is done using the classical Karatsuba multiplier. The classical Karatsuba
has large gate counts; however it is more compact for small sizedmultiplications due to the better LUT utilization. The
simple Karatsuba multiplier is more efficient for large sized multiplications. After a thorough search, a threshold of 29
was found. Multiplications smaller than 29 bits is done using the classical Karatsuba multiplier, while larger
multiplications are done with the the bit parallel Karatsuba multiplier.
ACKNOWLEDGMENT
I owe my most sincere gratitude to Ms. Divya S (Assistant Professor, ECE) for the great support and
co-operation, whose guidance I could complete the thesis work to the level we had planned, for the regular reviews and
suggestions. Last but not the least; I extend my sincere thanks to other staff members and my beloved friends for their
suggestions and support.
REFERENCES
[1] SujoySinha Roy, Chester Rebeiro and DebdeepMukhopadhyay Theoretical Modeling of Elliptic Curve
ScalarMultiplier on LUT-Based FPGAs for Area and Speed IEEETransactions On Very Large Scale Integration
(Vlsi) Systems, VOL. 21, NO. 5, MAY 2013.
[2] C.Grabbe, M.Bednara, J.Teich, J.vonzurGathen, and J.Shokrollahi, FPGA designs of parallel high performance
GF (2233) multipliers,ǁ in Proc.Int.Symp. Circuits Syst.(ISCAS), May 2003, pp.268-271.
[3] P.L.Montgomery,ǁ Five, six and seven-term Karatrsuba –like formulae, IEEE Trans. Comput., vol.54, no.3,
pp.362-369, Mar.2005.
[4] C.Paar,ǁA new architecture for a parallel finite fieldmultiplier with low complexity based on composite
fields,ǁIEEE Trans.Comput., vol.45, no.7, pp.856-861, 1996.
[5] C.Rebeiro and D.Mukhopadhyay,ǁ Power attack resistant efficient FPGA architecture for karatsuba multiplier,ǁ
in Proc.Int. Conf. VLSI Des., 2008, pp.706-711 N.S.Kim, T.Mudge, and R.Brown, ―A 2.3 Gb/s fully
integrated and synthesizable AES rinjdael core,ǁ in proc. IEEE CustomIntegrated Circuits Conf., 2003,
pp. 193-196.
[6] A.Reyhani-Masoleh and A.Hasan,ǁ Low complexity bitparallel architecture for polynomial basis multiplication
over GF(2m), IEEE Trans.Comput., vol.53, no.8, pp .945-995, Aug. 2004.
[7] F.Rodriguez-Henriquez and C.K.Koc,ǁ On fully parallel karatsuba multipliers for GF(2m),ǁ in Proceeding (394)
Computer Sciences and Technology. Cancun, Mexico: ACTA Press, 2003 Matthew P.Young June 1, 2006
―Basics of Elliptic curvesǁ.
[8] B.Sunar,ǁA generalization method for constructing subquadratic complexity GF (2K) multipliers,ǁ IEEE Trans.
Comput., vol.53, no.9, pp.1097-1105, sep.2004.
[9] VictorMiller, “Uses of Elliptic Curves in Cryptography, “Advances in Cryptology, Crypto’85, vol. 218,
pp. 417–426,1986.
[10] Alfred J. Menezes, Paul C. van Oorschot, and Scott A.Vanstone, Handbook of Applied Cryptography, CRC
Press.
[11] Anatoly A. Karatsuba and Y. Ofman, “Multiplication of Multidigit Numbers on Automata,” Soviet Physics
Doklady, l. 7, pp. 595–596, 1963.
[12] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible Attacks on RSA
Cryptosystem”, International Journal of Electronics and Communication Engineering & Technology (IJECET),
Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.

More Related Content

What's hot

Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
ijceronline
 
Review and evaluations of shortest path algorithms
Review and evaluations of shortest path algorithmsReview and evaluations of shortest path algorithms
Review and evaluations of shortest path algorithms
Pawan Kumar Tiwari
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
IJCERT
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
Arunanand Ta
 
Aes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityAes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced security
IAEME Publication
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Marisa Paryasto
 
Paper id 37201520
Paper id 37201520Paper id 37201520
Paper id 37201520IJRAT
 
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
theijes
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoder
ijsrd.com
 
Parallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architectureParallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architectureIAEME Publication
 
Floyd warshall algo {dynamic approach}
Floyd warshall algo {dynamic approach}Floyd warshall algo {dynamic approach}
Floyd warshall algo {dynamic approach}
Shubham Shukla
 
Cordic Code
Cordic CodeCordic Code
Cordic Code
Michelle_R
 
Digital Logic Circuits
Digital Logic CircuitsDigital Logic Circuits
Digital Logic Circuits
sathish sak
 
VHDL and Cordic Algorithim
VHDL and Cordic AlgorithimVHDL and Cordic Algorithim
VHDL and Cordic Algorithim
Subeer Rangra
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...
atanuanwesha
 
Shortest Path Problem
Shortest Path ProblemShortest Path Problem
Shortest Path Problem
Guillaume Guérard
 
OPTIMIZED REVERSIBLE VEDIC MULTIPLIERS
OPTIMIZED REVERSIBLE VEDIC MULTIPLIERSOPTIMIZED REVERSIBLE VEDIC MULTIPLIERS
OPTIMIZED REVERSIBLE VEDIC MULTIPLIERS
Uday Prakash
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
TELKOMNIKA JOURNAL
 

What's hot (19)

Ecc2
Ecc2Ecc2
Ecc2
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
 
Review and evaluations of shortest path algorithms
Review and evaluations of shortest path algorithmsReview and evaluations of shortest path algorithms
Review and evaluations of shortest path algorithms
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
Aes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced securityAes encryption engine for many core processor arrays for enhanced security
Aes encryption engine for many core processor arrays for enhanced security
 
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
 
Paper id 37201520
Paper id 37201520Paper id 37201520
Paper id 37201520
 
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
An Efficient Elliptic Curve Cryptography Arithmetic Using Nikhilam Multiplica...
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoder
 
Parallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architectureParallel algorithm for computing edt with new architecture
Parallel algorithm for computing edt with new architecture
 
Floyd warshall algo {dynamic approach}
Floyd warshall algo {dynamic approach}Floyd warshall algo {dynamic approach}
Floyd warshall algo {dynamic approach}
 
Cordic Code
Cordic CodeCordic Code
Cordic Code
 
Digital Logic Circuits
Digital Logic CircuitsDigital Logic Circuits
Digital Logic Circuits
 
VHDL and Cordic Algorithim
VHDL and Cordic AlgorithimVHDL and Cordic Algorithim
VHDL and Cordic Algorithim
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...
 
Shortest Path Problem
Shortest Path ProblemShortest Path Problem
Shortest Path Problem
 
OPTIMIZED REVERSIBLE VEDIC MULTIPLIERS
OPTIMIZED REVERSIBLE VEDIC MULTIPLIERSOPTIMIZED REVERSIBLE VEDIC MULTIPLIERS
OPTIMIZED REVERSIBLE VEDIC MULTIPLIERS
 
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
Efficiency of 128-bit Encryption and Decryption Process in Elgamal Method Usi...
 

Similar to Elliptic curve scalar multiplier using karatsuba

Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
IOSR Journals
 
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSORCOUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
IJNSA Journal
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordiciaemedu
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
ijceronline
 
WEEK 4- DLD-GateLvelMinimization.pptx
WEEK 4- DLD-GateLvelMinimization.pptxWEEK 4- DLD-GateLvelMinimization.pptx
WEEK 4- DLD-GateLvelMinimization.pptx
TaoqeerRajput
 
I43024751
I43024751I43024751
I43024751
IJERA Editor
 
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
CSCJournals
 
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRASYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
BRNSS Publication Hub
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12IJASCSE
 
Dk32696699
Dk32696699Dk32696699
Dk32696699
IJERA Editor
 
Ds36715716
Ds36715716Ds36715716
Ds36715716
IJERA Editor
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
Alexander Decker
 
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
IJERA Editor
 
Kk2518251830
Kk2518251830Kk2518251830
Kk2518251830
IJERA Editor
 
Kk2518251830
Kk2518251830Kk2518251830
Kk2518251830
IJERA Editor
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
ijcisjournal
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
IJCNCJournal
 

Similar to Elliptic curve scalar multiplier using karatsuba (20)

Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSORCOUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
COUPLED FPGA/ASIC IMPLEMENTATION OF ELLIPTIC CURVE CRYPTO-PROCESSOR
 
Implementation performance analysis of cordic
Implementation performance analysis of cordicImplementation performance analysis of cordic
Implementation performance analysis of cordic
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
 
WEEK 4- DLD-GateLvelMinimization.pptx
WEEK 4- DLD-GateLvelMinimization.pptxWEEK 4- DLD-GateLvelMinimization.pptx
WEEK 4- DLD-GateLvelMinimization.pptx
 
I43024751
I43024751I43024751
I43024751
 
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
Preference of Efficient Architectures for GF(p) Elliptic Curve Crypto Operati...
 
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRASYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE  AND LIE ALGEBRA
SYMMETRIC BILINEAR CRYPTOGRAPHY ON ELLIPTIC CURVE AND LIE ALGEBRA
 
Survey ecc 09june12
Survey ecc 09june12Survey ecc 09june12
Survey ecc 09june12
 
Dk32696699
Dk32696699Dk32696699
Dk32696699
 
Ds36715716
Ds36715716Ds36715716
Ds36715716
 
Ecc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithmEcc cipher processor based on knapsack algorithm
Ecc cipher processor based on knapsack algorithm
 
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
FPGA Implementation of A New Chien Search Block for Reed-Solomon Codes RS (25...
 
Kk2518251830
Kk2518251830Kk2518251830
Kk2518251830
 
Kk2518251830
Kk2518251830Kk2518251830
Kk2518251830
 
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
Implementation of Low-Complexity Redundant Multiplier Architecture for Finite...
 
40120130406008
4012013040600840120130406008
40120130406008
 
Topic 2
Topic 2Topic 2
Topic 2
 
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
ENHANCEMENT OF TRANSMISSION RANGE ASSIGNMENT FOR CLUSTERED WIRELESS SENSOR NE...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Elliptic curve scalar multiplier using karatsuba

  • 1. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 145 ELLIPTIC CURVE SCALAR MULTIPLIER USING KARATSUBA Ashna Paul1 , Divya.S2 1 M.Tech VLSI & Embedded Systems, ECE, SNGCE, Ernakulam, India 2 Assistant Professor, ECE, SNGCE, Ernakulam, India ABSTRACT Elliptic Curve Cryptography (ECC) provides similar level of security to conventional integer-based public-key algorithms, but with much shorter keys. ECC over binary field is of special interest because the operations in binary field are thought more space and time efficient. However, the software implementations of ECC over binary that are used in small computing devices such as sensor nodes. It replaces RSA because of its increased security with lesser number of key bits. Elliptic Curve scalar multiplication module will be available in majority of secure communication systems. The most important operation in Elliptic Curve Cryptosystem is the computation of scalar multiplication using karatsuba multiplier. In scalar multiplication of kP for given integer k and point P on elliptic curve. This work aims to design and implement elliptic curve scalar multiplier on a single field programmable gate array (FPGA).The hardware complexity is reduced using polynomial basis presentation of finite field and projective co-ordinate representation of elliptic curves. Keywords: Classical Multiplier, Cryptography, FPGA, Galois Multiplier I. I. INTRODUCTION Elliptic Curve Cryptography (ECC), proposed independently in 1985 by Neal Koblitz [1] and VictorMiller [2], has been used in cryptographic algorithms for a variety of security purposes such as key exchangeand digital signature. Compared to traditional integer based public-key algorithms, ECC algorithms canachieve the same level of security with much shorter keys. For example, 160-bit Elliptic-curve DigitalSignature Algorithm (ECDSA) has a security level equivalent to 1024-bit Digital Signature Algorithm(DSA) [3]. Because of the shorter key length, ECC algorithms run faster, require less space, and consumeless energy. These advantages make ECC a better choice of public-key cryptography, especially in resource constrained systems such as sensor nodes and mobile devices for pervasive computing Commonly-used elliptic curves are defined in either a prime field GF(p) or a finite field of characteristic twoGF(2m), which is also called a binary field [13]. The elliptic curves over binary field are of special interest tocryptography because the operations in a binary field are faster and easier to implement than those in primefields. We will focus on ECC over binary field in this paper. This is especially interesting for high performance system because of its carry free property. To reduce the complexity of simple karatsuba Multiplier, multiplier with less complexity over GF (2m ) based on simple and classical Karatsuba Multiplier is used. Furthermore, the experimental results on FPGAs for simple Karatsuba Multiplier and proposed karatsuba multiplier were shown and the comparison table is provided. In the first part of the paper we present our implementation of an Elliptic Curve scalarmultiplier is based on the projective coordinate system [5] and the Karatsuba [2] algorithm. The second part of the paper discusses our implementations of the important mathematical background. INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 12, December (2014), pp. 145-151 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) www.jifactor.com IJECET © I A E M E
  • 2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 146 II. PRELIMINARIES When defined in a binary field, an elliptic curve can be represented by y2 + x•y = x3 + a•x2 + b, (1) where a and b are constants in GF(2m ) and b ≠ 0. The set E(GF(2m )) includes all the points on the curve and aspecial point Ο, which is defined as the identity element For any point P = (x, y) in E, we have:P + Ο = Ο + P = P, Algorithm 1: Elliptic Curve Scalar Multiplier Input : An integer k ¹ 0 of length l bits and base point P Output : Q = kP 1. begin 2. Q = O 3. for i = l - 2 downto 0 do 4. Q = Double(Q) 5. if k = 0 then 6. Q = Add(Q, P) 7. end The cost of an inversion in affine coordinates is much more expensive in scalar multiplication . Inversions can be reduced by using a projective coordinator representation. A point P in projective coordinates is represented using three coordinates. In Lopez Dahab (LD) projective coordinates representation is given by Y2 + XYZ = X 3 Z + aX2 Z2 + bZ4 (1) The equation for point addition in LD coordinate for the projective point P = (X1, Y1, Z1) and the affine point Q (x2, y2) is shown in (1). The result is the point on the curve (P + Q) = (X3, Y3, Z3) A = y2 · Z2 + Y1 B = x2 · Z1 + X1 C = Z1 · B, D = B2 · (C + a · Z12) Z3 = C2 , E = A · C X3 = A2 + D + E, F = X3 +x2 · Z3 G = (x2 + y2) · Z 3 Y3 = (E + Z3) · F + G. To make it more efficient the scalar multiplication is the main operation in elliptic curve cryptography. Scalarmultiplication involves plenty of point addition and point doubling. In affine coordinates each point addition anddoubling involves a multiplicative inverse operation. Multiplicative inverse is a costly operation in finite fieldsTwo types of operations are done in finite field. They are prime field F(q) and binary field F(2m). Representing the points in projective coordinate systems can be eliminated the multiplicative inverse operation in point addition and point doubling and thereby increasing the efficiency of point multiplication operation. Before point multiplication the projective coordinate in elliptic curve to convert the given point in affine coordinate. Then projective coordinate convert it back to affine coordinate after point multiplication. The entire process requires only one multiplicative inverse operation. The operation in projective coordinate involves more scalar multiplication than in affine coordinate. ECC on projective coordinate will be efficient than affine coordinates .when the implementation of scalar multiplication using projective is much faster than multiplicative inverse operation. III. MATHEMATICAL BACKGROUND A finite field is also known as a Galois field. A Galois field in which the elements can take q is the prime number different values is referred to as GF(q). The formal properties of a finite field are: (a) There are two defined operations, namely point addition and point multiplication. (b) The result of adding or multiplying two elements from the field is always an element in the finite field. (c) One element of the field is the element zero, such that a + 0 = a for any element a in the field. (d) One element of the field is unity, so a • 1 = a for any element a in the field.
  • 3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 147 (e) For every element a in the field, there is an additive inverse element -a, such that a + ( - a) = 0. This allowsthe operation of subtraction to be defined as addition of the inverse. (f) For every non-zero element d in the field there is a multiplicative inverse element d-1 such that d.d-1= 1. Thisallows the operation of division to be defined as multiplication by the Inverse. (g) The associative [a + (b + c) = (a + b) + c, a • (b • c) = [(a • b) • c], commutative [a + b = b + a, a • b = b • a], and distributive [a • (b + c) = a • b + a • c] laws apply. These properties cannot be satisfied for all possible finitefield. They can, however, be satisfied if the field size is an prime number or any integer power of a prime. If theirreducible polynomial in binary field implementation is chosen to be trinomial the implementation of ECC on binary field can be made efficient than the prime field implementation. NIST specified domain parameters, theirreducible polynomials are either trinomial or pentanomial. These chosen polynomials cause the polynomial reduction in binary field to run much faster than the modular reduction in prime field. Irreducible polynomial is a polynomial of degree m that cannot be expressed as the product of two polynomials of lesser degree. If in any polynomial arithmetic operation the resultant polynomial is having degree greater than or equal to m, it is reduced to a polynomial of degree less than m by the irreducible polynomial. A. Point Addition Point addition is the addition of two points J and K on an elliptic curve to obtain another point L on the same elliptic curve. Fig 1: Point Addition Consider two points J and K on an elliptic curve as shown in figure (a). If K ≠ -J then a line drawn through the points J and K will intersect the elliptic curve at exactly one more point –L. The reflection of the point –L with respect to xaxis gives the point L, which is the result of addition of points J and K. Thus on an elliptic curve L = J + K. If K = -J the line through this point intersect at a point at infinity O. Hence J + (-J) = O. This is shown in figure (b). O is the additive identity of the elliptic curve group. A negative of a point is the reflection of that point with respect to x-axis. Consider two distinct points J and K such that J = (xJ, yJ) and K = (xK, yK) Let L = J + K where L = (xL, yL), then xL = s2 - xJ – XkyL = -yJ + s (xJ – xL) s = (yJ – yK)/(xJ – xK), s is the slope of the line through J and K. If K = -J i.e. K = (xJ, -yJ) then J + K = O. where O is the point at infinity. If K = J then J + K = 2J then point doubling equations are used. Also J + K = K + J. B. Point Doubling Point doubling is the addition of a point J on the elliptic curve to itself to obtain another point L on the same ellipticcurve To double a point J to get L, i.e. to find L = 2J, consider a point J on an elliptic curve as shown in figure (a).If y coordinate of the point J is not zero then the tangent linea J will intersect the elliptic curve at exactly one more point–L. The reflection of the point –L with respect to x-axisgives the point L, which is the result of doubling the point J.Thus L = 2J. If y coordinate of the point J is zero then thetangent at this point intersects at a point at infinity O. Hence 2J = O when yJ = 0. This is shown in figure (2)
  • 4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 148 Fig 2: Point Doubling Consider a point J such that J = (xJ, yJ), where yJ≠ 0 Let L = 2J where L = (xL, yL), Then xL = s2 – 2xJ yL = -yJ + s(xJ - xL) s = (3xJ+ a) / (2yJ), s is the tangent at point J and a is one of the parameters chosen with the lliptic curve .If yJ = 0 then 2J = O, where O is the point at infinity. IV. PROPOSED METHDOLOGY Finite field multiplication of two elements in the field (2m)is defined a C(x) = A(x) · B(x)mod P(x) . where C(x), A(x),and B(x) are in GF(2m) and P(x) is the irreduciblepolynomial that generates the field GF(2m). Implementingthe multiplication requires two steps. First, the polynomialproduct C′(x) = A(x) · B(x) is determined, then the modulooperation is done on C′(x). The Karatsuba multiplier uses adivide and conquers approach to multiply A(x) and B(x). Them term polynomials are recursively split into two. Witheach split the size of the multiplication required reducesby half.In the Karatsuba multiplier, the m bit multiplicands A(x)and B(x) represented in polynomial basis are split as shownin Equation 2 For brevity, the equations that followrepresent the polynomials Ah(x), Al(x), Bh(x), and Bl(x) byAh ,A l, Bh, and Bl respectively. A(x) = Ahxm/2 + Al B(x) = Bhxm/2 + Bl The multiplication is then done using three m/2 bitmultiplications C′(x) = (Ahxm/2 + Al)(Bhxm/2 + Bl) = AhBhxm + (AhBl + AlBh)xm/2 + AlBl = AhBhxm + ((Ah + Al)(Bh + Bl) + AhBh +AlBl)xm/2 + AlBl (2) The Karatsuba multiplier can be applied recursively to eachm/2 bit multiplication . Ideally this multiplier is best suitedwhen mis a power of 2, this allows the multiplicands to bebroken down until they reach 2 bits. The final recursionconsisting of 2 bit multiplications can be achieved by ANDgates. Such a multiplier with m a power of 2 is called thebasic Karatsuba multiplier.
  • 5. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 149 Fig:3: bit parallel karatsuba multiplier The classical Karatsuba multiplier is more efficient forsmall sizes of multiplicands, while the bit parallel Karatsuba multiplier is efficient for large multiplicands. In our proposed Karatsuba multiplier, all recursions are done usingthe the bit parallel Karatsuba multiplier except the finalrecursion. The final recursion is done using a classical Karatsuba multiplier when the multiplicands have a size lessthan 29 bits. The initial recursions using the Simple Karatsuba multiplier result in low gate count, while the finalrecursion using the classical Karatsuba multiplier results in low LUT requirements. For a163-bit proposed Karatsuba multiplier as shown in Figure 1, the initial four recursions are done using the Simple Karatsuba multiplier, while the final recursion is done with 20-bit and 21-bit General Karatsuba multipliers. Fig 4: proposed karatsuba multiplier
  • 6. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 150 V. COMPARISON The summary of the comparison between two scalar multipliers is tabulated as shown below. From the table the conclusion is proposed karatsuba multiplier has an area efficient design. That is, the second one has almost considerable reduction in area in terms of total equivalent gate count. TABLE: COMPARISON a. AREA ANALYSIS The synthesis report generated by the Xilinx ISE software tool can be used to analyze the area utilized by the two versions of the Montgomery karatsuba scalar multiplier. Device utilization summary is shown here for comparison. This report includes total number of 4 input LUTs, flipflops, the equivalent gate count etc. b. SIMULATION RESULT FOR SCALAR MULTIPLIER
  • 7. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 151 V. CONCLUSION The table the conclusion is proposed karatsuba multiplier has an area efficient design. That is, the second one has almost considerable reduction in area in terms of total equivalent gate count. The most important factorcontributing the performance is the finite field multiplication and finite field inversion. A Karatsuba multiplier is proposed for finite field multiplication, which has been shown to possess the best area time product compared to reported Karatsuba implementations. The Karatsuba multiplier is a recursive algorithm which does the initial recursions using the simple Karatsuba multiplier, while the final recursion is done using the classical Karatsuba multiplier. The classical Karatsuba has large gate counts; however it is more compact for small sizedmultiplications due to the better LUT utilization. The simple Karatsuba multiplier is more efficient for large sized multiplications. After a thorough search, a threshold of 29 was found. Multiplications smaller than 29 bits is done using the classical Karatsuba multiplier, while larger multiplications are done with the the bit parallel Karatsuba multiplier. ACKNOWLEDGMENT I owe my most sincere gratitude to Ms. Divya S (Assistant Professor, ECE) for the great support and co-operation, whose guidance I could complete the thesis work to the level we had planned, for the regular reviews and suggestions. Last but not the least; I extend my sincere thanks to other staff members and my beloved friends for their suggestions and support. REFERENCES [1] SujoySinha Roy, Chester Rebeiro and DebdeepMukhopadhyay Theoretical Modeling of Elliptic Curve ScalarMultiplier on LUT-Based FPGAs for Area and Speed IEEETransactions On Very Large Scale Integration (Vlsi) Systems, VOL. 21, NO. 5, MAY 2013. [2] C.Grabbe, M.Bednara, J.Teich, J.vonzurGathen, and J.Shokrollahi, FPGA designs of parallel high performance GF (2233) multipliers,ǁ in Proc.Int.Symp. Circuits Syst.(ISCAS), May 2003, pp.268-271. [3] P.L.Montgomery,ǁ Five, six and seven-term Karatrsuba –like formulae, IEEE Trans. Comput., vol.54, no.3, pp.362-369, Mar.2005. [4] C.Paar,ǁA new architecture for a parallel finite fieldmultiplier with low complexity based on composite fields,ǁIEEE Trans.Comput., vol.45, no.7, pp.856-861, 1996. [5] C.Rebeiro and D.Mukhopadhyay,ǁ Power attack resistant efficient FPGA architecture for karatsuba multiplier,ǁ in Proc.Int. Conf. VLSI Des., 2008, pp.706-711 N.S.Kim, T.Mudge, and R.Brown, ―A 2.3 Gb/s fully integrated and synthesizable AES rinjdael core,ǁ in proc. IEEE CustomIntegrated Circuits Conf., 2003, pp. 193-196. [6] A.Reyhani-Masoleh and A.Hasan,ǁ Low complexity bitparallel architecture for polynomial basis multiplication over GF(2m), IEEE Trans.Comput., vol.53, no.8, pp .945-995, Aug. 2004. [7] F.Rodriguez-Henriquez and C.K.Koc,ǁ On fully parallel karatsuba multipliers for GF(2m),ǁ in Proceeding (394) Computer Sciences and Technology. Cancun, Mexico: ACTA Press, 2003 Matthew P.Young June 1, 2006 ―Basics of Elliptic curvesǁ. [8] B.Sunar,ǁA generalization method for constructing subquadratic complexity GF (2K) multipliers,ǁ IEEE Trans. Comput., vol.53, no.9, pp.1097-1105, sep.2004. [9] VictorMiller, “Uses of Elliptic Curves in Cryptography, “Advances in Cryptology, Crypto’85, vol. 218, pp. 417–426,1986. [10] Alfred J. Menezes, Paul C. van Oorschot, and Scott A.Vanstone, Handbook of Applied Cryptography, CRC Press. [11] Anatoly A. Karatsuba and Y. Ofman, “Multiplication of Multidigit Numbers on Automata,” Soviet Physics Doklady, l. 7, pp. 595–596, 1963. [12] Varun Shukla and Abhishek Choubey, “A Comparative Analysis of the Possible Attacks on RSA Cryptosystem”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.