An Embedded RISC-V Core with Fast Modular Multiplication

09/30/2020
by   Ömer Faruk Irmak, et al.
0

One of the biggest concerns in IoT is privacy and security. Encryption and authentication need big power budgets, which battery-operated IoT end-nodes do not have. Hardware accelerators designed for specific cryptographic operations provide little to no flexibility for future updates. Custom instruction solutions are smaller in area and provide more flexibility for new methods to be implemented. One drawback of custom instructions is that the processor has to wait for the operation to finish. Eventually, the response time of the device to real-time events gets longer. In this work, we propose a processor with an extended custom instruction for modular multiplication, which blocks the processor, typically, two cycles for any size of modular multiplication when used in Partial Execution mode. We adopted embedded and compressed extensions of RISC-V for our proof-of-concept CPU. Our design is benchmarked on recent cryptographic algorithms in the field of elliptic-curve cryptography. Our CPU with 128-bit modular multiplication operates at 136MHz on ASIC and 81MHz on FPGA. It achieves up to 13x speed up on software implementations while reducing overall power consumption by up to 95% with 41% average area overhead over our base architecture.

READ FULL TEXT
research
09/08/2020

Quad-Core RSA Processor with Countermeasure Against Power Analysis Attacks

Rivest-Shamir-Adleman (RSA) cryptosystem uses modular multiplication for...
research
08/08/2023

Novel Area-Efficient and Flexible Architectures for Optimal Ate Pairing on FPGA

While FPGA is a suitable platform for implementing cryptographic algorit...
research
04/19/2023

Baugh-Wooley Multiplication for the RISCV Processor

This article describes an efficient way to implement the multiplication ...
research
10/01/2019

Reverse Engineering x86 Processor Microcode

Microcode is an abstraction layer on top of the physical components of a...
research
01/25/2022

Faster multiplication over 𝔽_2[X] using AVX512 instruction set and VPCLMULQDQ instruction

Code-based cryptography is one of the main propositions for the post-qua...
research
01/19/2022

A Low-Power BLS12-381 Pairing Crypto-Processor for Internet-of-Things Security Applications

We present the first BLS12-381 elliptic curve pairing crypto-processor f...
research
08/29/2023

Area Efficient Modular Reduction in Hardware for Arbitrary Static Moduli

Modular reduction is a crucial operation in many post-quantum cryptograp...

Please sign up or login with your details

Forgot password? Click here to reset