Design and Implementation of SM2 Co-processor with Specific Instructions
WANG Tengfei, ZHANG Haifeng, XU Sen
1.School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
2.Beijing Smartchip Microelectronics Technology Company Limited, Beijing 100192, China
3.Viewsource (Shanghai) Technology Company Limited, Shanghai 200241, China
WANG Tengfei, ZHANG Haifeng, XU Sen. Design and Implementation of SM2 Co-processor with Specific Instructions[J]. Computer Engineering and Applications, 2022, 58(2): 102-109.
[1] KOBLITZ N.Elliptic curve cryptosystems[J].Mathematics of Computation,1987,48(177):203-209.
[2] 国家密码管理局.SM2椭圆曲线公钥密码算法:GM/T 0003—2012[S].北京:国家密码管理局,2012.
State Cryptography Administration.SM2 elliptic curve public key cryptography:GM/T 0003—2012[S].Beijing:State Cryptography Administration,2012.
[3] LOI K C C,KO S B.Scalable elliptic curve cryptosystem FPGA processor for NIST prime curves[J].IEEE Transactions on Very Large Scale Integration Systems,2015,23(11):2753-2756.
[4] ZHANG D,BAI G.High-performance implementation of SM2 based on FPGA[C]//2016 8th IEEE International Conference on Communication Software and Networks(ICCSN),Beijing,Jun 4-6,2016.Piscataway,NJ:IEEE,2016:718-722.
[5] KEUTZER K,MALIK S,NEWTON A R.From ASIC to ASIP:the next design discontinuity[C]//Proceedings of the 2002 IEEE International Conference on Computer Design(ICCD’02),Freiberg,Sept 18,2002.Piscataway,NJ:IEEE,2002:84-90.
[6] 张军.ECC协处理器专用指令与可重构单元设计技术研究[D].郑州:解放军信息工程大学,2010.
ZHANG Jun.Research on technology of application specific instruction and reconfigurable unit of elliptic curve cryptography coprocessor design[D].Zhengzhou:PLA Information Engineering University,2010.
[7] 夏辉,于佳,秦尧,等.嵌入式领域ECC专用指令处理器的研究[J].计算机学报,2017,40(5):1092-1108.
XIA Hui,YU Jia,QIN Yao,et al.The researches on the ASIP of ECC in embedded domain[J].Chinese Journal of Computers,2017,40(5):1092-1108.
[8] MONTGOMERY P L.Modular multiplication without trial division[J].Mathematics of Computation,1985,44(170):519-521.
[9] MENEZES A J,OORSCHOT P C V,VANSTONE S A.Handbook of applied cryptography[M].New York:CRC Press,1996:606-609.
[10] HANKERSON D,MENEZES A,VANSTONE S.Guide to elliptic curve cryptography[M].Berlin:Springer,2004:153-171.
[11] MONTGOMERY P L.Speeding the pollard and elliptic curve methods of factorization[J].Mathematics of Computation,1987,48(177):243-264.
[12] WANG Tengfei,GUO Wei,WEI Jizeng.Highly-parallel hardware implementation of optimal ate pairing over Barreto-Naehrig curves[J].Integration,2019,64:13-21.
[13] GUERON S,KRASNOV V.Fast prime field elliptic-curve cryptography with 256-bit primes[J].Journal of Cryptographic Engineering,2014,5(2):141-151.
[14] ANANYI K,ALRIMEIH H,RAKHMATOV D.Flexible hardware processor for elliptic curve cryptography over NIST prime fields[J].IEEE Transactions on Very Large Scale Integration Systems,2009,17(8):1099-1112.
[15] MARZOUQI H,QUTAYRI M A,SALAH K.An FPGA implementation of NIST 256 prime field ECC processor[C]//2013 IEEE 20th International Conference on Electronics,Circuits,and Systems(ICECS),Abu Dhabi,Dec 8-11,2013.Piscataway,NJ:IEEE,2013:493-496.