Open Access
ARTICLE
FPGA Implementation of Elliptic-Curve Diffie Hellman Protocol
1 Department of Aeronautical Engineering, Estonian Aviation Academy, Tartu, 61707, Estonia
2 Department of Mathematics, College of Science, King Khalid University, Abha, 61413, Saudi Arabia
3 Department of Electrical Engineering, Bahria University, Islamabad, 44000, Pakistan
4 Department of Computer Engineering, Umm Al-Qura University, Makkah, 21955, Saudi Arabia
* Corresponding Author: Sikandar Zulqarnain Khan. Email:
Computers, Materials & Continua 2022, 73(1), 1879-1894. https://doi.org/10.32604/cmc.2022.028152
Received 03 February 2022; Accepted 06 March 2022; Issue published 18 May 2022
Abstract
This paper presents an efficient crypto processor architecture for key agreement using ECDH (Elliptic-curve Diffie Hellman) protocol over . The composition of our key-agreement architecture is expressed in consisting of the following: (i) Elliptic-curve Point Multiplication architecture for public key generation (DESIGN-I) and (ii) integration of DESIGN-I with two additional routing multiplexers and a controller for shared key generation (DESIGN-II). The arithmetic operators used in DESIGN-I and DESIGN-II contain an adder, squarer, a multiplier and inversion. A simple shift and add multiplication method is employed to retain lower hardware resources. Moreover, an essential inversion operation is operated using the Itoh-Tsujii algorithm with similar hardware resources of used squarer and multiplier units. The proposed architecture is implemented in a Verilog HDL. The implementation results are given on a Xilinx Virtex-7 FPGA (field-programmable gate array) device. For DESIGN-I and DESIGN-II over , (i) the utilized Slices are 3983 and 4037, (ii) the time to compute one public key and a shared secret is 553.7 μs and 1170.7 μs and (iii) the consumed power is 29 μW and 57 μW. Consequently, the achieved area optimized and power reduced results show that the proposed ECDH architecture is a suitable alternative (to generate a shared secret) for the applications that require low hardware resources and power consumption.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.