To search, Click below search items.

 

All Published Papers Search Service

Title

High-speed and Secure Elliptic Curve Cryptosystem for Multimedia Applications

Author

Mohammad Alkhatib

Citation

Vol. 25  No. 8  pp. 124-138

Abstract

The last few years have witnessed a rapid increase in the use of multimedia applications, which led to an explosion in the amount of data sent over communication networks. Therefore, it has become necessary to find an effective security solution that preserves the confidentiality of such enormous amount of data sent through unsecure network channels and, at the same time, meets the performance requirements for applications that process the data. This research introduces a high-speed and secure elliptic curve cryptosystem (ECC) appropriate for multimedia security. The proposed ECC improves the performance of data encryption process by accelerating the scaler multiplication operation, while strengthening the immunity of the cryptosystem against side channel attacks.The speed of the encryption process has been increased via the parallel implementation of ECC computations in both the upper scaler multiplication level and the lower point operations level. To accomplish this, modified version of the Right to Left binary algorithm as well as eight parallel multipliers (PM) were applied to allow parallel implementation of point doubling and addition. Moreover, projective coordinates systems were used to remove the time-consuming inversion operation. The current 8-PM ECC achieves higher performance level, compared to previous ECC implementations, and reduces the risk of side channel attacks. In addition, current research work provides performance and resources-consumption analysis for Weierstrass elliptic curve representation over prime field. Presented ECCs were implemented using VHDL, and synthesized using the Xilinx tool with target FPGA. The best performance results were accomplished when using the Montgomery curve. However, the proposed ECC implementation consumes more resources.

Keywords

Elliptic curves cryptosystem, Performance, Binary method, Projective Coordinates, Security applications.

URL

http://paper.ijcsns.org/07_book/202508/20250816.pdf