Towards High-Performance FPGA Implementation of ECDSA for Koblitz Curve: An Instruction-Set Approach

Authors

  • Phu Nguyen Department of Electronics, Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam | Vietnam National University-Ho Chi Minh City, Ho Chi Minh City, Vietnam
  • Hung Nguyen Department of Electronics, Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam | Vietnam National University-Ho Chi Minh City, Ho Chi Minh City, Vietnam
  • Kim Anh Phan Vo Department of Electronics, Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam | Vietnam National University-Ho Chi Minh City, Ho Chi Minh City, Vietnam
  • Linh Tran Department of Electronics, Ho Chi Minh City University of Technology, Ho Chi Minh City, Vietnam | Vietnam National University-Ho Chi Minh City, Ho Chi Minh City, Vietnam
Volume: 15 | Issue: 3 | Pages: 23546-23552 | June 2025 | https://doi.org/10.48084/etasr.11040

Abstract

This paper presents a novel instruction-set-based hardware implementation of the Elliptic Curve Digital Signature Algorithm (ECDSA) for a 256-bit Koblitz curve on FPGA. The research contribution under consideration utilizes the integration of Koggle-Stone Adders (KSAs) into the modified structure of modular multiplication and inversion units, thereby enabling high-speed performance in modular computation architecture. Furthermore, by employing an instruction-set-based approach for the control unit instead of the conventional finite state machine for the implementations of ECDSA and point multiplications, we can complete a scalar multiplication operation in less than 2 ms. Our design achieved 110.44 MHz in clock speed on Xilinx Artix-7, occupying 6.4K slices in resource utilization. The modified algorithms employed are constant time, thereby preventing timing attacks. The design is efficient in terms of speed, area, and throughput.

Keywords:

elliptic curve digital signature algorithm, Koblitz curve, koggle-stone adders, instruction-set approach

Downloads

Download data is not yet available.

References

N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987.

V. S. Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology — CRYPTO ’85 Proceedings, Santa Barbara, CA, USA, 1985, pp. 417–426.

H. C. A. Tilborg and S. Jajodia, Encyclopedia of Cryptography and Security, 2nd ed. New York, NY, USA: Springer, 2011.

A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography, 1st ed. Boca Raton, FL, USA: CRC Press, Inc., 1996.

S. Mangard, E. Oswald, and T. Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards, 1st ed. New York, NY, USA: Springer, 2007.

L. Breveglieri, I. Koren, D. Naccache, and J.-P. Seifert, Eds., Fault Diagnosis and Tolerance in Cryptography: Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006. Proceedings, 1st ed. Berlin, Heidelberg, Germany: Springer, 2006.

K. Jarvinen and J. Skytta, "On Parallelization of High-Speed Processors for Elliptic Curve Cryptography," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 16, no. 9, pp. 1162–1175, Sep. 2008.

H. M. Choi, C. P. Hong, and C. H. Kim, "High Performance Elliptic Curve Cryptographic Processor Over GF(2^163)," in 4th IEEE International Symposium on Electronic Design, Test and Applications (delta 2008), Hong Kong, China, 2008, pp. 290–295.

B. Yang, K. Wu, and R. Karri, "Scan based side channel attack on dedicated hardware implementations of Data Encryption Standard," in 2004 International Conferce on Test, Charlotte, NC, USA, 2004, pp. 339–344.

R. Azarderakhsh, K. U. Järvinen, and M. Mozaffari-Kermani, "Efficient algorithm and architecture for elliptic curve cryptography for extremely constrained secure applications," IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 61, no. 4, pp. 1144–1155, Apr. 2014.

T. Oliveira, J. López, and F. Rodríguez-Henríquez, "Software Implementation of Koblitz Curves over Quadratic Fields," in 18th International Conference on Cryptographic Hardware and Embedded Systems, Santa Barbara, CA, USA, 2016, pp. 259–279.

J. Fan, X. Guo, E. De Mulder, P. Schaumont, B. Preneel, and I. Verbauwhede, "State-of-the-art of secure ECC implementations: a survey on known side-channel attacks and countermeasures," in 2010 IEEE International Symposium on Hardware-Oriented Security and Trust, Anaheim, CA, USA, 2010, pp. 76–87.

A. Verri Lucca, G. A. Mariano Sborz, V. R. Q. Leithardt, M. Beko, C. Albenes Zeferino, and W. D. Parreira, "A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware," Journal of Sensor and Actuator Networks, vol. 10, no. 1, Mar. 2021, Art. no. 3.

E. S. I. Harba, "Secure Data Encryption Through a Combination of AES, RSA and HMAC," Engineering, Technology & Applied Science Research, vol. 7, no. 4, pp. 1781–1785, Aug. 2017.

Md. M. Islam, Md. S. Hossain, Moh. K. Hasan, Md. Shahjalal, and Y. M. Jang, "FPGA Implementation of High-Speed Area-Efficient Processor for Elliptic Curve Point Multiplication Over Prime Field," IEEE Access, vol. 7, pp. 178811–178826, 2019.

B. K. Do-Nguyen, C. Pham-Quoc, N.-T. Tran, C.-K. Pham, and T.-T. Hoang, "Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor," IEEE Access, vol. 11, pp. 4879–4894, 2023.

X. Hu, X. Zheng, S. Zhang, S. Cai, and X. Xiong, "A Low Hardware Consumption Elliptic Curve Cryptographic Architecture over GF(p) in Embedded Application," Electronics, vol. 7, no. 7, Jul. 2018, Art. no. 104.

Y. Hao et al., "Lightweight Architecture for Elliptic Curve Scalar Multiplication over Prime Field," Electronics, vol. 11, no. 14, Jul. 2022, Art. no. 2234.

M. A. Javed, E. Ben Hamida, and W. Znaidi, "Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice," Sensors, vol. 16, no. 6, Jun. 2016, Art. no. 879.

T. Kudithi and S. R, "An efficient hardware implementation of the elliptic curve cryptographic processor over prime field," International Journal of Circuit Theory and Applications, vol. 48, no. 8, pp. 1256–1273, Mar. 2020.

T. Kudithi and J. A. Solinas, "Generalized Mersenne Numbers," Center for Applied Cryptographic Research, University of Waterloo, Technical report CORR-99-39, 1999. [Online]. Available: https://cacr.uwaterloo.ca/techreports/1999/corr99-39.pdf.

P. L. Montgomery, "Speeding the Pollard and elliptic curve methods of factorization," Mathematics of Computation, vol. 48, no. 177, pp. 243–264, 1987.

H. Xiao, S. Yu, B. Cheng, and G. Liu, "FPGA-based high-throughput Montgomery modular multipliers for RSA cryptosystems," IEICE Electronics Express, vol. 19, no. 9, pp. 20220101–20220101, 2022.

E. Savaş and Ç. K. Koç, "Montgomery inversion," Journal of Cryptographic Engineering, vol. 8, no. 3, pp. 201–210, Sep. 2018.

M. Rogawski, E. Homsirikamol, and K. Gaj, "A novel modular adder for one thousand bits and more using fast carry chains of modern FPGAs," in 2014 24th International Conference on Field Programmable Logic and Applications (FPL), Munich, Germany, 2014, pp. 1–8.

Downloads

How to Cite

[1]
Nguyen, P., Nguyen, H., Phan Vo, K.A. and Tran, L. 2025. Towards High-Performance FPGA Implementation of ECDSA for Koblitz Curve: An Instruction-Set Approach. Engineering, Technology & Applied Science Research. 15, 3 (Jun. 2025), 23546–23552. DOI:https://doi.org/10.48084/etasr.11040.

Metrics

Abstract Views: 26
PDF Downloads: 27

Metrics Information