polito.it
Politecnico di Torino (logo)

Binary Edward Elliptic Curve CryptoCore Accelerator

Gioele Sineo

Binary Edward Elliptic Curve CryptoCore Accelerator.

Rel. Guido Masera, Maurizio Martina. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Elettronica (Electronic Engineering), 2023

[img]
Preview
PDF (Tesi_di_laurea) - Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives.

Download (56MB) | Preview
[img] Archive (ZIP) (Documenti_allegati) - Altro
Licenza: Creative Commons Attribution Non-commercial No Derivatives.

Download (75kB)
Abstract:

Internet of Things (IoT) is a vast network connecting billions of devices through the Internet to share data. Many of these devices have limited resources, so they store their data in the cloud, allowing people to access it from anywhere. However, this cloud storage raises security concerns because data owners have little control over how their data is managed. To address these security concerns and accommodate the limited resources of IoT devices, we use lightweight cryptographic methods. One such method is Elliptic Curve Cryptography (ECC), a type of public-key cryptography. ECC is becoming popular in IoT security, smart card security, and digital signatures because it offers strong security with shorter keys compared to traditional methods like RSA. ECC can be implemented with minimal hardware and low energy use, making it ideal for securing low-power, low-memory IoT devices. A significant advantage of elliptic curve cryptography is its resistance to current threats from quan- tum computers. While quantum computers promise to quickly solve problems that are beyond the capabilities of traditional computers, such as factoring large prime numbers, elliptic curves generate computational challenges that require much more time and resources to be handled even by quantum computers. This resilience makes it an attractive choice for the future of cryptography. ECC can be integrated into small chips to provide fast data encryption and decryption. It also offers secure key agreement protocols that prevent unauthorized access to wireless sensor networks (WSNs) connected to IoT infrastructures. In RFID technology, ECC-based authentication protocols en- hance security in smart healthcare environments. Additionally, ECC-based digital signature schemes like ECDSA and EdDSA are used in wireless body area networks (WBANs) to secure real-time health data, such as blood pressure and heart rate. Modern security protocols like TLS and DTLS use these signature schemes for efficient authentication in IoT platforms. For this purpose i propose an Crypto accelerator based on BEC, implemented reducing as much as possible the area and the critical path for the point multiplication over Galois Prime Field GF(p) implemented following the Montgomery Ladder Algorithm (left-to-right), are also proposed all ar- chitectures resulting from meticulous evolution throughout the project of the intermediate modular operation write in VHDL. Finally utilising Xilinx Vivado is done the synthesis for virtex-7 FPGA to obtain an initial approximation of the performance, considering that this result are affected by a big delay of the interconnection and area limitation due to the CLB organisation of the board, instead better result are obtained in the last step of ASIC synthesis on silicon chip. In conclusion, elliptic curve cryptography represents one of the most promising prospects in the direction of cybersecurity in the post-quantum world. Its ability to provide robust data protection with shorter keys and its resistance to quantum computers make it a key choice for ensuring the security of digital communications

Relatori: Guido Masera, Maurizio Martina
Anno accademico: 2023/24
Tipo di pubblicazione: Elettronica
Numero di pagine: 92
Soggetti:
Corso di laurea: Corso di laurea magistrale in Ingegneria Elettronica (Electronic Engineering)
Classe di laurea: Nuovo ordinamento > Laurea magistrale > LM-29 - INGEGNERIA ELETTRONICA
Aziende collaboratrici: NON SPECIFICATO
URI: http://webthesis.biblio.polito.it/id/eprint/29376
Modifica (riservato agli operatori) Modifica (riservato agli operatori)