An optimized hardware architecture for the montgomery multiplication algorithm

  • Authors:
  • Miaoqing Huang;Kris Gaj;Soonhak Kwon;Tarek El-Ghazawi

  • Affiliations:
  • The George Washington University, Washington, DC;George Mason University, Fairfax, VA;Sungkyunkwan University, Suwon, Korea;The George Washington University, Washington, DC

  • Venue:
  • PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Montgomery modular multiplication is one of the fundamental operations used in cryptographic algorithms, such as RSA and Elliptic Curve Cryptosystems. At CHES 1999, Tenca and Koç introduced a now-classical architecture for implementing Montgomery multiplication in hardware. With parameters optimized for minimum latency, this architecture performs a single Montgomery multiplication in approximately 2n clock cycles, where n is the size of operands in bits. In this paper we propose and discuss an optimized hardware architecture performing the same operation in approximately n clock cycles with almost the same clock period. Our architecture is based on pre-computing partial results using two possible assumptions regarding the most significant bit of the previous word, and is only marginally more demanding in terms of the circuit area. The new radix-2 architecture can be extended for the case of radix-4, while preserving a factor of two speed-up over the corresponding radix-4 design by Tenca, Todorov, and Koç from CHES 2001. Our architecture has been verified by modeling it in Verilog-HDL, implementing it using Xilinx Virtex-II 6000 FPGA, and experimentally testing it using SRC-6 reconfigurable computer.