![]() Based on this notion, new elliptic curve cryptographic processor architecture is presented here which results in significant reduction in execution time and gives a range of trade-off between speed and area. Inversion operations can be replaced by several simpler multiplication operations using projective coordinates system instead of the classical affine coordinates. Modular Inversion is known to be the most time consuming operation performed by the ECC crypto-processor. Arithmetic operations involved in ECC computation suffers from modular inversion operation. ![]() This interest is mainly caused by the same level of security with relatively small keys provided by ECC comparing to other large public key algorithms such as RSA where it is known that a 160-bit ECC has roughly the same security strength as 1024 bit RSA. In the last two decades, Elliptic Curve Cryptography (ECC) has increasingly being used and considered as one of the top public key cryptography schemes.
0 Comments
Leave a Reply. |