A High-Throughput FPGA-Based Elliptic Curve Digital Signature Core for IoT Edge Platforms | SpringerLink
Skip to main content

A High-Throughput FPGA-Based Elliptic Curve Digital Signature Core for IoT Edge Platforms

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2024 Workshops (ICCSA 2024)

Abstract

Information security is significant in many aspects, especially in IoT applications such as healthcare or monitoring. Therefore, cryptography algorithms are usually deployed on IoT edge platforms to ensure the integrity and safety of information. As one of the most attractive and efficient methods for implementing digital signature algorithms (DSA), elliptic curve cryptography (ECC) can be used for many security applications. In this work, we design and build an FPGA-based DSA hardware computing core with the ECC algorithm, called ECDSA, to accelerate the processing throughput of IoT edge platforms. We deploy the proposed system on the Kria KV260 edge computing platform with a Xilinx Zynq UltraScale+ FPGA device. Experimental results with test vectors provided by the National Institute of Standards and Technology (NIST) show that our edge computing platform can generate up to 3,361 signatures per second, with a processing throughput of up to 2.46 Mbps.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 14871
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 18589
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Elliptic Curve Arithmetic, pp. 75–152. Springer New York, New York, NY (2004). https://doi.org/10.1007/0-387-21846-7_3

  2. AMD Xilinx: kria kv260 vision AI starter kit user guide (ug1089) (2022), DOIhttps://docs.amd.com/r/en-US/ug1089-kv260-starter-kit Accessed Jan 31

  3. AMD Xilinx: Xilinx vivado design suite (2023). https://www.xilinx.com/products/design-tools/vivado.html Accessed 31 Jan 2024

  4. Biookaghazadeh, S., Zhao, M., Ren, F.: Are FPGAs suitable for edge computing? In: USENIX Workshop on Hot Topics in Edge Computing (HotEdge 18). USENIX Association, Boston, MA (2018). https://www.usenix.org/conference/hotedge18/presentation/biookaghazadeh

  5. Chaudhary, S., Johari, R., Bhatia, R., Gupta, K., Bhatnagar, A.: Craiot: concept, review and application(s) of IoT. In: 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), pp. 1–4 (2019). https://doi.org/10.1109/IoT-SIU.2019.8777467

  6. Chen, L., Moody, D., Regenscheid, A., Robinson, A.: Digital signature standard (DSS) (2023-02-02 05:02:00 2023). https://doi.org/10.6028/NIST.FIPS.186-5

  7. Di Matteo, S., Baldanzi, L., Crocetti, L., Nannipieri, P., Fanucci, L., Saponara, S.: Secure elliptic curve crypto-processor for real-time IoT applications. Energies 14(15), 4676 (2021)

    Article  Google Scholar 

  8. Do-Nguyen, B.K., Pham-Quoc, C., Tran, N.T., Pham, C.K., Hoang, T.T.: Multi-functional resource-constrained elliptic curve cryptographic processor. IEEE Access 11, 4879–4894 (2023)

    Article  Google Scholar 

  9. Glas, B., Sander, O., Stuckert, V., Müller-Glaser, K.D., Becker, J.: Prime field ECDSA signature processing for reconfigurable embedded systems. Int. J. Reconfigurable Comput. 2011, 1–12 (2011)

    Article  Google Scholar 

  10. Hasan, M.: IoT in healthcare: 20 examples that’ll make you feel better (2020). https://www.ubuntupit.com/iot-in-healthcare-20- examples-thatll-make-you-feel-better Accessed 22 May 22

  11. Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 IEEE World Congress on Services, pp. 21–28. IEEE (2015)

    Google Scholar 

  12. Islam, M.M., Hossain, M.S., Hasan, M.K., Shahjalal, M., Jang, Y.M.: FPGA implementation of high-speed area-efficient processor for elliptic curve point multiplication over prime field. IEEE Access 7, 178811–178826 (2019)

    Article  Google Scholar 

  13. Lanner: examples of IoT devices in your next smart home (2018). https://www.lanner-america.com/blog/5-examples-iotdevices-next-smart-home Accessed 22 May

  14. NIST Computer Security Resources Center: cryptographic algorithm validation program (2023). https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/digital-signatures Accessed 31 Jan 31

  15. Panjwani, B.: Scalable and parameterized hardware implementation of elliptic curve digital signature algorithm over prime fields. In: 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 211–218. IEEE (2017)

    Google Scholar 

  16. Pham-Quoc, C.: FPGA-based hardware/software codesign for video encoder on IoT edge platforms. In: International Conference on Computational Science and its Applications, pp. 82–96. Springer (2023). https://doi.org/10.1007/978-3-031-37117-2_7

  17. Pham-Quoc, C., Heisswolf, J., Werner, S., Al-Ars, Z., Becker, J., Bertels, K.: Hybrid interconnect design for heterogeneous hardware accelerators. In: 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE), pp. 843–846. IEEE (2013)

    Google Scholar 

  18. Pham-Quoc, C., Thinh, T.N.: FPGA-enabled efficient framework for high-performance intrusion prevention systems. In: International Conference on Computational Science and its Applications, pp. 83–98. Springer (2023). https://doi.org/10.1007/978-3-031-37120-2_6

  19. Sghaier, A., Zeghid, M., Massoud, C., Machout, M.: Design and implementation of low area/power elliptic curve digital signature hardware core. Electronics 6(2), 46 (2017)

    Article  Google Scholar 

  20. Statista Research Department: internet of things - number of connected devices worldwide 2015–2025 (2016), https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ Accessed 01 April 2023

  21. Wajih, E., Noura, B., Mohsen, M., Rached, T.: Low power elliptic curve digital signature design for constrained devices. Int. J. secur. (IJS) 6(2), 1–14 (2012)

    Google Scholar 

  22. Youssef, N.B.H., Youssef, W.E.H., Machhout, M., Tourki, R., Torki, K.: A low-resource 32-bit datapath ecdsa design for embedded applications. In: 2014 International Carnahan Conference on Security Technology (ICCST), pp. 1–6. IEEE (2014)

    Google Scholar 

Download references

Acknowledgement

We acknowledge Ho Chi Minh City University of Technology (HCMUT), VNU-HCM for supporting this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cuong Pham-Quoc .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pham-Quoc, C., Ngan, P.L.S. (2024). A High-Throughput FPGA-Based Elliptic Curve Digital Signature Core for IoT Edge Platforms. In: Gervasi, O., Murgante, B., Garau, C., Taniar, D., C. Rocha, A.M.A., Faginas Lago, M.N. (eds) Computational Science and Its Applications – ICCSA 2024 Workshops. ICCSA 2024. Lecture Notes in Computer Science, vol 14820. Springer, Cham. https://doi.org/10.1007/978-3-031-65285-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-65285-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-65284-4

  • Online ISBN: 978-3-031-65285-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics