SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Downloaden Sie, um offline zu lesen
arXiv:1401.3421v1[cs.AR]15Jan2014
Performance Evaluation of ECC in Single and Multi
Processor Architectures on FPGA Based Embedded
System
Sruti Agarwal1,∗
, Sangeet Saha2
, Rourab Paul3
, Amlan Chakrabarti4
Abstract
Cryptographic algorithms are computationally costly and the challenge is
more if we need to execute them in resource constrained embedded systems.
Field Programmable Gate Arrays (FPGAs) having programmable logic de-
vices and processing cores, have proven to be highly feasible implementation
platforms for embedded systems providing lesser design time and reconfig-
urability. Design parameters like throughput, resource utilization and power
requirements are the key issues. The popular Elliptic Curve Cryptography
(ECC), which is superior over other public-key crypto-systems like RSA in
many ways, such as providing greater security for a smaller key size, is cho-
sen in this work and the possibilities of its implementation in FPGA based
embedded systems for both single and dual processor core architectures in-
volving task parallelization have been explored. This exploration, which is
first of its kind considering the other existing works, is a needed activity for
evaluating the best possible architectural environment for ECC implementa-
tion on FPGA (Virtex4 XC4VFX12, FF668, -10) based embedded platform.
Keywords: FPGA, ECC, single-core, dual-core, MicroBlaze, shared
memory
∗
Corresponding author
1
Institute of RadioPhysics and Electronics, University of Calcutta, Kolkata.
2
CSE, University of Calcutta, Kolkata.
3
A.K.Choudhury School of I.T., University of Calcutta, Kolkata.
4
Senior Memeber IEEE, A.K.Choudhury School of I.T., University of Calcutta,
Kolkata.
Preprint submitted to ICCN-2013/ICDMW-2013/ICISP-2013 January 16, 2014
1. Introduction
ECC is an approach to public-key cryptography based on the algebraic
structure of elliptic curves over finite fields. The use of elliptic curves in
cryptography was suggested independently by Neal Koblitz[1] and Victor S.
Miller[2] in 1985. Elliptic curve cryptography, in essence, entails using the
group of points on an elliptic curve as the underlying number system for
public key cryptography. The primary reason for using elliptic curves as a
basis for public key crypto-systems is that elliptic curve based crypto-systems
appear to provide better security than traditional crypto-systems for a given
key size[4], thereby reducing the process overhead. One can take advantage
of this fact to increase security, or (more often) to increase performance by
reducing the key size while keeping the same security.
Designers are now working on designing dedicated hardware accelerator
blocks along with the main processor [5][7][8] to increase the throughput
of the design. ECC algorithm is used for secured communication in smart
cards[9] and also in GSM security[6]. So, high speed, resource constrained en-
vironment is required. Using a dual-core instead of a dedicated co-processor
enables the user to operate from the application layer without entering the
subordinate layers. Also, the thread-level parallelism, used by the dual-core
ensures higher throughput without increasing the much power, which is an
important issue for low-power communication devices like smart cards. Im-
plementations can be made in different platforms namely, FPGA or ASIC or
can be done using micro-controllers. FPGAs provides reconfigurability and
lesser design time, while ASIC provides better throughput though the de-
sign time is large and expensive. We propose the design and implementation
of Elliptic Curve Cryptography (ECC) encryption algorithm by developing
suitable single core and dual core design on Xilinx Virtex 4 (ML403) device.
The system is optimized in terms of execution speed. We perform a trade-off
between throughput, power and resource requirements for our dual core im-
plementation. To the best of our knowledge, dual-soft core processor based
implementation of ECC in an FPGA is not yet available in related literatures
and hence it is first of its kind.
The paper is organized as follows: Section 2 details the overview of ECC,
the encryption and decryption process. The design and implementation de-
tails for single and dual-core processor architectures are described in Section
3. The experimental results are summarized in Section 4. Conclusion and
References are briefed in Section 5.
2
2. Background
This section provides some background on elliptic curves and ECC and
then the hardness of decrypting the elliptic curve ciphers is also discussed.
The idea of a multi processor system, establishment of communication be-
tween the processors using shared memory and the needed data synchroniza-
tion is also briefed in the later part of this section.
2.1. Elliptic Curves
Elliptic curves are described by curves, which are similar to cubic equa-
tions, used for calculating the circumference of an ellipse. In general, cubic
equations for elliptic curves take the following form known as Weierstrass
equation[3]:
(y2
+ axy + by) mod p = (x3
+ cx2
+ dx + e) mod p (1)
where a, b,c, d, e, p are real numbers and x and y take on any values in the
real numbers. For our purpose, it is sufficient to limit ourselves to equation
of the form given in Equation2 for appropriate curve parameters of ECC.
y2
mod p = (x3
+ ax + b) mod p (2)
Figure 1 shows an example of elliptic curve.
P
Q
-(P + Q)
(P + Q)
-2 -1 0 1 2 3
0
2
-2
-4
4
4
6
Figure 1: Example of Elliptic Curve
3
2.2. Elliptic Curve Cryptography
ECC can be used to encrypt a plain text message M into cipher text for
secured communication. Firstly, the plain text message M is converted into
a set of finite points PM (x, y), which lie in the elliptic curve Ep(a, b). A
generator point, G ∈ Ep(a, b), is chosen next such that the smallest value of
n for which nG = O is a very large prime number. The elliptic curve Ep(a,
b) and the generator point G are then made public.
Let there be two parties A and B who wish to communicate using
ECC. Each user selects a private key, user A’s private key is nA, while nB is
the private key for user B such that nA, nB <n. Then they compute their
public keys. The public key of A is PA = nAG, while for B the public key is
PB = nBG. To send the secret message to B, A encrypts the message point
PM by choosing a random number k and computes the cipher text points
CM using B’s public key. The cipher text is given by:
CM = [(kG), (PM + kPB)] (3)
On receiving the cipher text (pair of points) CM , B multiplies the first pair of
points (kG) with his private key nB, and then adds the result to the second
point of the cipher text (PM + kPB) i.e.,
(PM + kPB) − [nB(kG)] = (PM + knBG) − [nB(kG)] = PM (4)
Plain text message point PM , corresponds to the message M. It is to be
observed here that only B can remove nB(kG) from the second part of the
cipher text. No, third party or intruder can know the message except B.
Thus, ECC is very secured and can be relied for confidential communication.
Breaking of ECC is a “hard problem”, which requires computing of discreet
logarithm [3].
2.3. Multi processor system
A multi processor system consists of two or more processors working
concurrently and capable of communicating with each other. Such a design
tends to double the throughput, with two processors running independently,
but with an extra cost of resource and power. On the other hand, a multi
core system is one in which more than one processor is build on the same die.
In FPGA we have on-chip soft processor cores, which has been utilized in our
design to multi core design. There are some basic conditions required for the
execution of a design in a multi core system. The primary being concurrency
4
in the design i.e., no data dependency must be present in processes that run in
different processors and also the two processors must have some handshaking
for synchronization of data. Multi core processors often use a shared memory
system or a Mailbox system as a interprocessor communication mechanism,
that operates very quickly[11].
2.4. Shared Memory
In a multi core environment, mailbox and shared memory [12] are the
two mechanisms, provided by Xilinx. Out of these two mechanisms, shared
memory is the most common and most intuitive way of passing information
between processing subsystems and we have used it in our design.
A shared memory system has the following properties[12]:
•Any processor can refer any location in the shared memory directly by some
system call.
•Location of data in memory is transparent to the programmer. Data could
be distributed across multiple processors, with the help of some proper API,
data can be handled at program level.
•A synchronization is a must for accessing the shared memory segment by
some hardware/software protocol between the two processors.
Shared memory is typically the fastest asynchronous mode of communica-
tion, especially when the information to be shared is large. Shared memory
gives another approach of ”in-place” message processing schemes. Shared
memory can be built out of on-chip local memory like BRAM or on external
memory like DDR SDRAM.
2.5. Synchronization
The region in which the shared data is stored is known as a Critical
Region in operating system terminology. Unless there is some sort of well-
defined non-conflicting way in which each processor accesses the shared data,
the multi core system cannot work properly. A synchronization protocol or
construct is usually required to serialize accesses to the shared resource.
The XPS Mutex synchronization primitive is used in this work, which is
provided by Xilinx as a separate IP-core[13]. When using Shared memory as
a method of data communication, the pseudo code should look like this to
ensure proper synchronization,
/* shared tasks */
XMutex Lock ();
5
/* Critical Region - Perform shared memory access */
XMutex Unlock ();
By calling the XMutex Lock() it must be ensured that one processor is
accessing the critical region and other processor should not be allowed to
access the same until XMutex LocK () is called by that processor.
3. Design and Implementation
This section highlights the key components of our proposed design. At
first, we describe the processor that is used and then we brief the design
innovations made to enhance the throughput.
3.1. MicroBlaze
The MicroBlaze embedded processor soft core is a 32-bit Reduced In-
struction Set Computer (RISC) optimized for implementation in FPGAs[10].
As a soft-core processor, MicroBlaze is implemented entirely in the general-
purpose memory and logic fabric of Xilinx FPGAs. The Embedded Devel-
opment Kit (EDK) platform from Xilinx has been used to build a complete
processor system on FPGA.
3.2. ECC in Single MicroBlaze
In a single processor architecture, the FPGA receives the input via the
RS-232 port through UART and then the input plaintext message is en-
crypted using ECC algorithm, which is running in the MicroBlaze processor
of the the FPGA. After encryption, the cipher text is send back to the Host
PC and is seen in the Hyper Terminal using serial communication between
the board and the PC. Figure 2 shows the flow of steps in the design. Proces-
sor working at 100MHz clock frequency is used to encrypt 8-bits of message
using ECC. Scalar multiplication constitutes the main operation in ECC. It
is seen that the processor takes 19.01 msec to perform the total encryption.
The resource utilized i.e., the number of LUTs and slices required by the
design as well as the power requirements are summarized in the table 2.
3.3. ECC in Dual MicroBlaze
After evaluating the performance of ECC in single processor architecture
by using MicroBlaze soft-core processor, another approach is taken to im-
plement it in Dual processor architecture by considering the fact discussed
in Section 2.3 for higher throughput and efficiency. Xilinx Virtex4 ML403
6
Keys & Plaintext
Ciphertext
MicroBlaze
Running ECC
Block RAM
Processor
Local Bus
(PLB)
Local Memory
Bus (LMB)
BRAM
Controller
System
UART
32 bit
32 bit
Local Memory
Bus (LMB)
BRAM
Controller
Figure 2: Single MicroBlaze Architecture
is taken as a platform for design. Shared memory is used for creating a
handshaking between the two processors as described in Section 2.4 and the
synchronization for communication is achieved using the process described
in Section 2.5. Fig. 3 shows the architecture of Dual MicroBlaze design,
PLB v46PLB v46
XPS_BRAMXPS_BRAM
Boot
Memory
Boot
Memory
MicroBlaze
1
MicroBlaze
2
Multi Port
Memory Controller
SDRAM
Shared Memory
XPS_
Mutex-core
Periph-
eral
for
MB-2
Periph-
eral
for
MB-1
Port A Port B
PLB v46 PLB v46
Figure 3: Dual MicroBlaze Architectural flow
In addition, multiple port memory controller (DDR SDRAM) and inter-
processor communication-XPS Mutex hardware IP [13] is also incorporated
in the test bed to facilitate the memory sharing and inter processor synchro-
nization and communication.
In the experiment, the two processors are equally engaged to execute
ECC in parallel fashion and in between the consequent steps, the two pro-
cessors communicate with each other via shared memory with proper syn-
chronization. The message to be encrypted is transferred to the FPGA from
7
a computer using RS232 serial port communication. The two multiplications
are executed concurrently in two processors and the resulting data is assem-
bled in the shared memory. The addition operation is then performed by
the 1st processor and the resultant cipher text is generated. The resultant
cipher text is send back to the PC using the RS232 interface and is viewed at
the Hyper Terminal of the computer. Fig. 4 shows the mechanism in which
the two processors communicate using the shared memory and using Mutex
locking and unlocking.
MicroBlaze-1 MircoBlaze-2
Multiplication (kG) Multiplication(kPb)
DDR-SDRAM
Mutex_Unlock
Addition (Pm+kPb)
1st part of
Cipher
2nd paprt of
Cipher
PLB v46
UART
BRAM BRAM
PLB=Processor Local Bus
Encrypted
message
Output at Hyperterminal
of Host PC
Mutex_lock
PLB v46
I/P THROUGH
KEYBOARD
Input
plain text
ECC ENCRYPTION
Figure 4: ECC in Dual MicroBlaze
4. Result and Analysis
It is seen that the encryption engine speeds up by 3.3 times as the pro-
posed architecture takes only 5.72 msec to perform the encryption.The re-
source estimation, power required and throughput measurements for both the
designs are shown in Table 1 and Table 2 below. The design improves the
throughput of execution, but utilizes more resources due to the dual cores.
It is to be noted here that the throughput of the design can be improved
further by enabling the cache memory. But due to the resource constraints
of our implementation board the cache memory of the two processors could
not be enabled.
5. Conclusion and Future Work
This work is an exploration of ECC implementation for FPGA based
embedded systems. Two specific designs have been addressed, the first one
8
Table 1: For an encryption process
Architecture Clock Freq. # clock Time Reqd. Throughput
(in MHz) cycles reqd. (in msec) (bits per sec)
Single-core Microblaze 100 1901317 19.01 420.83
Dual-core Microblaze 100 572552 5.72 1398.60
Table 2: Resource and Power Estimation for the encryption process
Processor Clock Freq. # # Slice # 4-input Through Total Power
(in MHz) Slices FFs LUTs put per slice (in Watts)
Single-core 100 3580 3750 4076 0.1175 1.106
Microblaze
Dual-core 100 5313 6637 7495 0.2632 1.808
Microblaze
is simpler involving a single Microblaze core whereas the other one utilizes
two Microblaze cores and thus enables multi-threading. The dual core based
implementation gives almost a 3 times increase in the throughput but utilizes
almost twice the resource and 30% more power as compared to the single
core based implementation. This clearly shows a trade off between speed,
resource utilization and power requirement. In future we look forward to
do a further exploration of ECC implementation for embedded applications
involving FPGA based hard processor cores and ASIC based design.
References
[1] Koblitz Neal, “Elliptic Curve Cryptosystems,” Mathematics of Compu-
tation 48 , (177): 203–209. JSTOR 2007884.
[2] Miller Victor, “Use of elliptic curves in cryptography,” CRYPTO 85 :
417–426 doi : 10.1007/3 − 540 − 39799 − X 31.
[3] Stalling William, “Cryptography and Network Security: Principles and
Practice (6th Edition),” , ISBN: 0133354695.
[4] Batina L., Ors S., Preneel B., Vandewalle J., “Hardware architectures
for public key cryptography,” Integration, the VLSI Journal, 34(1-2):1-
64, 2003.
9
[5] Sozzani Fabio, Bertoni Guido, Turcato Stefano, Breveglieri Luco and
Milano P, “A parallelized design for an Elliptic Curve Cryptosystem
Coprocessor,” in Proceedings of the International Conference on Infor-
mation Technology: Coding and Computing (ITCC05), IEEE, 0–7695–
2315–3/05.
[6] Goswami Sukalyan, Laha Subarna, Chakraborty Satarupa, Dhar
Ankana, “Enhancement of GSM Security Using Elliptic Curve Cryp-
tography Algorithm,” inThird International Conference on Intelligent
Systems Modelling and Simulation, DOI 10.1109/ISMS.2012.137.
[7] McIvor J. Ciaran, McLoone Maire, McCanny V. John, “Hardware Ellip-
tic Curve Cryptographic Processor Over GF(p),” in IEEE Transactions
on Circuits and Systems-I, vol. 53, No. 9, pp. 1051–7122, 2006.
[8] Fan Junfeng, Sakiyama Kazuo and Verbauwhede Ingrid, “Elliptic curve
cryptography on embedded multicore systems,” in Journal on Design
Automation for Embedded Systems, vol. 12, pp.231–242, 2008.
[9] Abdurahmonov Tursun, Yeoh Eng-Thiam and Mohamed Hussain Helmi,
“Improving Smart Card Security Using Elliptic Curve Cryptography
over Prime Field (Fp),” in Artificial Intelligence, NPD, SCI 368, pp.127–
140, 2011.
[10] “MicroBlaze Processor Reference Guide, Em-
bedded Development Kit EDK 10.1i,” in,
http : //www.xilinx.com/support/documentation/sw manuals/mb ref guide.pdf.
[11] William Wong, “Baisc of design,Embedded Processor,”
http : //electronicdesign.com/embedded/embedded − processors
[12] Vasanth Asokan., “Designing Multiprocessor Systems in Plat-
form Studio,” in White Paper: Xilinx Platform Studio (XPS),
http : //www.xilinx.com/support/documentation/white papers/wp262.pdf.
[13] “XAPP996,Xilinx application note on Dual Processor,” in,
http : //www.xilinx.com/support/documentation/application notes/xapp996.pdf.
10
Authors’ Instructions for the Preparation of
Camera-Ready Manuscript to Elsevier Proceedings
Venugopal K Ra,1,∗
, L M Patnaikb,2
a
University Visvesvaraya College of Engineering, Bangalore University, Bangalore.
b
Honorary Professor, Indian Institute of Science, Bangalore.
Abstract
The abstract should summarize the contents of the paper and should contain
at least 70 and at most 150 words. It should be written using the abstract
environment.
Keywords: We would like to encourage you to list your keywords within
the abstract section.
1. Introduction
You are strongly encouraged to use LATEX for the preparation of your
camera-ready manuscript together with the corresponding Elsevier style file.
The LATEX source of this instruction file for LATEX users may be used as a
template. This is located in the Guidelines for authors link in elsevier.com
link. Kindly send the final checked source and PDF files of your paper to
the Contact Volume Editor. This is usually one of the organizers of the
conference. Make sure that the LATEX and the PDF files are identical and
correct and that only one version of your paper is sent. Since it is impossible
to update files at a later stage. Please do not send the printed paper.
The papers once published cannot be updated or changed at any cost.
This applies to both the printed book and the online version of the publica-
tion. Every detail, including the order of the names of the authors, should
be checked before the paper is sent to the Volume Editors.
∗
Corresponding author
URL: http://www.venugopalkr.com (Venugopal K R)
1
Principal, University Visvesvaraya College of Engineering, Bangalore.
2
Honorary Professor, Indian Institute of Science, Bangalore.
Preprint submitted to ICCN-2013/ICDMW-2013/ICISP-2013 September 18, 2012
1.1. Checking the PDF File
Kindly assure that the Contact Volume Editor is given the name and
email address of the contact author for your paper.
In some cases, it is the Contact Volume Editor that checks all the final
pdfs. In such cases, the authors are not involved in the checking phase.
1.2. Additional Information Required by the Volume Editor
If you have more than one surname, please make sure that the Volume
Editor knows how you are to be listed in the author index.
1.3. Copyright Forms
The copyright form may be downloaded from the For Authors section of
the Elsevier Website: www.elsevier.com. Please send your signed copyright
form to the Contact Volume Editor as a scanned pdf. One author may sign
on behalf of all of the other authors of a particular paper.
2. Floats
Figures may be included using the command, includegraphics in combi-
nation with or without its several options to further control graphic. include-
graphics is provided by graphic[s,x].sty which is part of any standard LATEX
distribution. A graphicx.sty is loaded by default. LATEX accepts figures in
postscript format while A pdfLATEX.
AT X accepts *.pdf, *.mps (metapost), *.jpg and *.png formats. pdfLATEX
does not accept graphic files in postscript format.
The table environment is handy for marking up tabular material. If users
want to use multirow.sty, array.sty, etc., to fine control/enhance the tables,
they are welcome to load any package of their choice and elsarticle.cls will
work in combination with all loaded packages.
2.0.1. Headings.
Headings should be capitalized (i.e., nouns, verbs, and all other words
except articles, prepositions, and conjunctions should be set with an initial
capital) and should, with the exception of the title, be aligned to the left.
Words joined by a hyphen are subject to a special rule. If the first word can
stand alone, the second word should be capitalized.
2
2.0.2. Lemmas, Propositions, and Theorems.
The numbers accorded to lemmas, propositions, and theorems, etc. should
appear in consecutive order, starting with Lemma 1, and not, for example,
with Lemma 11.
2.1. Figures
For LATEX users, we recommend using the graphics or graphicx package.
Please check that the lines in line drawings are not interrupted and are of
a constant width. Grids and details within the figures must be clearly legible
and may not be written one on top of the other. Line drawings should have
a resolution of at least 800 dpi (preferably 1200 dpi). The lettering in figures
should have a height of 2 mm (10-point type). Figures should be numbered
and should have a caption which should always be positioned under the
figures, in contrast to the caption belonging to a table, which should always
appear above the table; this is simply achieved as matter of sequence in your
source.
Please center the figures or your tabular material. Short captions are
centered by default between the margins and typeset in 9-point type. The
distance between text and figure is preset to be about 8 mm, the distance
between figure and caption about 6 mm.
To ensure that the reproduction of your illustrations is of a reasonable
quality, we advise against the use of shading. The contrast should be as
pronounced as possible.
If screenshots are necessary, please make sure that you are happy with
the print quality before you send the files.
Use the format to generate the Figure 1.
2.2. Itemization
(i) Find maximum number of keymatches between the communicating
nodes.
(ii) Choosing a secure path based on the Link Strength.
2.3. Table
The notations used in this paper are given in Table 1.
3
A
C
D
E
B
Figure 1: Connectivity of Sleep Nodes.
Table 1: Notations
Symbols Definition
dst Destination Node
src Source Node
Rnd() Pseudo Random Generating Function
Kr Maximum possible value that is generated
2.4. Formulas
Displayed equations or formulas are centered and set on a separate line
(with an extra line or halfline space above and below). Displayed expressions
should be numbered for reference. The numbers should be consecutive within
each section or within the contribution, with numbers enclosed in parentheses
and set on the right margin –which is the default if you use the equation
environment, e.g.,
P
m
=
P!
m!(P − m)!
(1)
Equations should be punctuated in the same way as ordinary text but
with a small space before the end punctuation mark.
2.5. Footnotes
The superscript numeral used to refer to a footnote appears in the text
either directly after the word to be discussed or – in relation to a phrase or
a sentence – following the punctuation sign (comma, semicolon, or period).
4
Table 2: Algorithm: Secure QoS-Aware Data Fusion (SQDF)
First Phase
begin
Send Data Packet
end
Second Phase
begin
Receive Data Packet
if(malicious node)
Reset the timer
else
Reset the timer for deffer time
Fuses data
end
Footnotes should appear at the bottom of the normal text area, with a line
of about 2 cm set immediately above them.3
2.6. Citations
For citations in the text please use square brackets and consecutive num-
bers: [1], [2], [3] – provided automatically by LATEX.
2.7. Page Numbering and Running Heads
There is no need to include page numbers. If your paper title is too long
it will be shortened.
2.8. Algorithm
Place the algorithm within a box as shown in Table 2.
3. Graphs
The graphs are shown in Figure 2 and Figure 3.
3
The footnote numeral is set flush left and the text follows with the usual word spacing.
5
50
55
60
65
70
75
80
85
90
95
60 70 80 90 100 110 120
Percentageofsleepnodes
Communication Radius - Rc (m)
No. of nodes=100
No. of nodes=200
No. of nodes=300
No. of nodes=400
Figure 2: Percentage of Sleep Nodes.
0
1
2
3
4
5
6
7
8
60 70 80 90 100 110 120
PercentageofnodesactiveforCommunication
Communication Radius - Rc (m)
No. of nodes=100
No. of nodes=200
No. of nodes=300
No. of nodes=400
Figure 3: Percentage of Communication
Unit Active Nodes.
4. Conclusions
Check List before submission of the final manuscript.
The final LATEX source files
A final PDF file
A copyright form, signed by one author on behalf of all of the authors
of the paper.
A readme giving the name and email address of the corresponding
author.
Appendix
If any mathematical derivations or theoretical concepts are exisiting, in-
clude in the Appendix.
Acknowledgments.
The previous work authors can be appreciated or the funding agencies
can be acknowledged.
6
5. The References Section
In order to permit cross referencing standardizing format has to be used in
the references. References that don’t adhere to this style will be reformatted
by Elsevier. You should therefore check your references thoroughly when you
receive the final pdf of your paper. The reference section must be complete.
You may not omit references.
The following section shows a sample reference list with entries for pro-
ceedings without editors [1], journal articles [2], transactions [3], a book [4],
URL [5].
References
[1] F. L. Lewis, D. J. Cook, S. K. Dasm and John Wiley, “Wireless Sensor
Networks,” in Proceedings Smart Environment Technologies, Protocols
and Applications, New York, 2004, pp. 1–18.
[2] Kui Ren, Kai Zeng and Wenjing Lou, “A New Approach for Random
Key Pre-distribution in Large-Scale Wireless Sensor Networks,” in Jour-
nal on Wireless Communications and Mobile Computing, vol. 6, pp.
307–318, 2006.
[3] Chia-Mu Yu, Chun-Shien Lu and Sy-Yen Kuo, “Noninteractive Pairwise
Key Establishment for Wireless Sensor Networks,” in IEEE Transac-
tions on Information Forensics and Security, vol. 5, no. 3, pp. 556–569,
2010.
[4] Raj Jain, “Art of Computer System Performance Analysis,” in Wiley
India Pvt. Ltd, 2009, pp. 198–200.
[5] http : //www.statcac.com/statistics/correlation − regression.
7

Weitere ähnliche Inhalte

Was ist angesagt?

Lecture 3 parallel programming platforms
Lecture 3   parallel programming platformsLecture 3   parallel programming platforms
Lecture 3 parallel programming platformsVajira Thambawita
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSPERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSijcisjournal
 
Porting MPEG-2 files on CerberO, a framework for FPGA based MPSoc
Porting MPEG-2 files on CerberO, a framework for FPGA based MPSocPorting MPEG-2 files on CerberO, a framework for FPGA based MPSoc
Porting MPEG-2 files on CerberO, a framework for FPGA based MPSocadnanfaisal
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...IJCSEIT Journal
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdleSAT Publishing House
 
Lecture 7 cuda execution model
Lecture 7   cuda execution modelLecture 7   cuda execution model
Lecture 7 cuda execution modelVajira Thambawita
 
IRJET- Chatbot Using Gated End-to-End Memory Networks
IRJET-  	  Chatbot Using Gated End-to-End Memory NetworksIRJET-  	  Chatbot Using Gated End-to-End Memory Networks
IRJET- Chatbot Using Gated End-to-End Memory NetworksIRJET Journal
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkIJMTST Journal
 
Hardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmpHardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmpeSAT Publishing House
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environmentidescitation
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
 

Was ist angesagt? (17)

shashank_hpca1995_00386533
shashank_hpca1995_00386533shashank_hpca1995_00386533
shashank_hpca1995_00386533
 
Lecture 3 parallel programming platforms
Lecture 3   parallel programming platformsLecture 3   parallel programming platforms
Lecture 3 parallel programming platforms
 
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTSPERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
PERFORMANCE ANALYSIS OF SHA-2 AND SHA-3 FINALISTS
 
1
11
1
 
SoC-2012-pres-2
SoC-2012-pres-2SoC-2012-pres-2
SoC-2012-pres-2
 
Porting MPEG-2 files on CerberO, a framework for FPGA based MPSoc
Porting MPEG-2 files on CerberO, a framework for FPGA based MPSocPorting MPEG-2 files on CerberO, a framework for FPGA based MPSoc
Porting MPEG-2 files on CerberO, a framework for FPGA based MPSoc
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
 
Fpga based encryption design using vhdl
Fpga based encryption design using vhdlFpga based encryption design using vhdl
Fpga based encryption design using vhdl
 
Lecture 7 cuda execution model
Lecture 7   cuda execution modelLecture 7   cuda execution model
Lecture 7 cuda execution model
 
Advance DBMS
Advance DBMSAdvance DBMS
Advance DBMS
 
IRJET- Chatbot Using Gated End-to-End Memory Networks
IRJET-  	  Chatbot Using Gated End-to-End Memory NetworksIRJET-  	  Chatbot Using Gated End-to-End Memory Networks
IRJET- Chatbot Using Gated End-to-End Memory Networks
 
Design of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection NetworkDesign of an Efficient Communication Protocol for 3d Interconnection Network
Design of an Efficient Communication Protocol for 3d Interconnection Network
 
Parallel Processing Concepts
Parallel Processing Concepts Parallel Processing Concepts
Parallel Processing Concepts
 
Hardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmpHardback solution to accelerate multimedia computation through mgp in cmp
Hardback solution to accelerate multimedia computation through mgp in cmp
 
Secure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile EnvironmentSecure Checkpointing Approach for Mobile Environment
Secure Checkpointing Approach for Mobile Environment
 
Eg25807814
Eg25807814Eg25807814
Eg25807814
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 

Andere mochten auch

Hats 6b a_warm_saturn_transiting_an_early_m_dwarf_star_and_a_set_of_empirical...
Hats 6b a_warm_saturn_transiting_an_early_m_dwarf_star_and_a_set_of_empirical...Hats 6b a_warm_saturn_transiting_an_early_m_dwarf_star_and_a_set_of_empirical...
Hats 6b a_warm_saturn_transiting_an_early_m_dwarf_star_and_a_set_of_empirical...Sérgio Sacani
 
Cyklistické prilby ALPINA 2012
Cyklistické prilby ALPINA 2012Cyklistické prilby ALPINA 2012
Cyklistické prilby ALPINA 2012Ivo Vydra
 
Cyklistické prilby ALPINA 2013
Cyklistické prilby ALPINA 2013 Cyklistické prilby ALPINA 2013
Cyklistické prilby ALPINA 2013 Ivo Vydra
 
Como elaborar rubricas
Como elaborar rubricasComo elaborar rubricas
Como elaborar rubricasMikoto T
 
Katalog 2012
Katalog 2012Katalog 2012
Katalog 2012Ivo Vydra
 
Senior Healthcare Consultant (Geriatric) class at Piedmont Hospitals
Senior Healthcare Consultant (Geriatric) class at Piedmont HospitalsSenior Healthcare Consultant (Geriatric) class at Piedmont Hospitals
Senior Healthcare Consultant (Geriatric) class at Piedmont Hospitalsnomadicnurse
 
Tip top cistiace-pripravky
Tip top cistiace-pripravkyTip top cistiace-pripravky
Tip top cistiace-pripravkyIvo Vydra
 
Katalóg Alpina okuliare sport13-14
Katalóg Alpina okuliare sport13-14Katalóg Alpina okuliare sport13-14
Katalóg Alpina okuliare sport13-14Ivo Vydra
 
Day 2 senior healthcare consultant conference
Day 2 senior healthcare consultant conferenceDay 2 senior healthcare consultant conference
Day 2 senior healthcare consultant conferencenomadicnurse
 
Emergency Department and Outpatient Senior Healthcare Consultant Course
Emergency Department and Outpatient Senior Healthcare Consultant CourseEmergency Department and Outpatient Senior Healthcare Consultant Course
Emergency Department and Outpatient Senior Healthcare Consultant Coursenomadicnurse
 
Sensess - Marketing & Promotion Strategy
Sensess - Marketing & Promotion StrategySensess - Marketing & Promotion Strategy
Sensess - Marketing & Promotion StrategyVishnu Vallabh
 
Nutrition in Older Adults with voice overs
Nutrition in Older Adults with voice oversNutrition in Older Adults with voice overs
Nutrition in Older Adults with voice oversnomadicnurse
 

Andere mochten auch (20)

Hats 6b a_warm_saturn_transiting_an_early_m_dwarf_star_and_a_set_of_empirical...
Hats 6b a_warm_saturn_transiting_an_early_m_dwarf_star_and_a_set_of_empirical...Hats 6b a_warm_saturn_transiting_an_early_m_dwarf_star_and_a_set_of_empirical...
Hats 6b a_warm_saturn_transiting_an_early_m_dwarf_star_and_a_set_of_empirical...
 
Merokok23
Merokok23Merokok23
Merokok23
 
Cyklistické prilby ALPINA 2012
Cyklistické prilby ALPINA 2012Cyklistické prilby ALPINA 2012
Cyklistické prilby ALPINA 2012
 
Cyklistické prilby ALPINA 2013
Cyklistické prilby ALPINA 2013 Cyklistické prilby ALPINA 2013
Cyklistické prilby ALPINA 2013
 
Como elaborar rubricas
Como elaborar rubricasComo elaborar rubricas
Como elaborar rubricas
 
Katalog 2012
Katalog 2012Katalog 2012
Katalog 2012
 
Merokok54
Merokok54Merokok54
Merokok54
 
Presentation1
Presentation1Presentation1
Presentation1
 
Merokok 4
Merokok 4Merokok 4
Merokok 4
 
Senior Healthcare Consultant (Geriatric) class at Piedmont Hospitals
Senior Healthcare Consultant (Geriatric) class at Piedmont HospitalsSenior Healthcare Consultant (Geriatric) class at Piedmont Hospitals
Senior Healthcare Consultant (Geriatric) class at Piedmont Hospitals
 
Esd
EsdEsd
Esd
 
Tip top cistiace-pripravky
Tip top cistiace-pripravkyTip top cistiace-pripravky
Tip top cistiace-pripravky
 
Katalóg Alpina okuliare sport13-14
Katalóg Alpina okuliare sport13-14Katalóg Alpina okuliare sport13-14
Katalóg Alpina okuliare sport13-14
 
Merokok 2
Merokok 2Merokok 2
Merokok 2
 
Day 2 senior healthcare consultant conference
Day 2 senior healthcare consultant conferenceDay 2 senior healthcare consultant conference
Day 2 senior healthcare consultant conference
 
1) acampora, masse surrenaliche
1) acampora, masse surrenaliche1) acampora, masse surrenaliche
1) acampora, masse surrenaliche
 
Emergency Department and Outpatient Senior Healthcare Consultant Course
Emergency Department and Outpatient Senior Healthcare Consultant CourseEmergency Department and Outpatient Senior Healthcare Consultant Course
Emergency Department and Outpatient Senior Healthcare Consultant Course
 
Pres ru
Pres ruPres ru
Pres ru
 
Sensess - Marketing & Promotion Strategy
Sensess - Marketing & Promotion StrategySensess - Marketing & Promotion Strategy
Sensess - Marketing & Promotion Strategy
 
Nutrition in Older Adults with voice overs
Nutrition in Older Adults with voice oversNutrition in Older Adults with voice overs
Nutrition in Older Adults with voice overs
 

Ähnlich wie Performance evaluation of ecc in single and multi( eliptic curve)

An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...eSAT Publishing House
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...Nikhil Jain
 
Accelerating Real Time Applications on Heterogeneous Platforms
Accelerating Real Time Applications on Heterogeneous PlatformsAccelerating Real Time Applications on Heterogeneous Platforms
Accelerating Real Time Applications on Heterogeneous PlatformsIJMER
 
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Nikhil Jain
 
Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...eSAT Journals
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...IAEME Publication
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...IAEME Publication
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSijngnjournal
 
Cache performance-x86-2009
Cache performance-x86-2009Cache performance-x86-2009
Cache performance-x86-2009Léia de Sousa
 
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORSAFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORScscpconf
 
Affect of parallel computing on multicore processors
Affect of parallel computing on multicore processorsAffect of parallel computing on multicore processors
Affect of parallel computing on multicore processorscsandit
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...IJNSA Journal
 
Network Processing on an SPE Core in Cell Broadband EngineTM
Network Processing on an SPE Core in Cell Broadband EngineTMNetwork Processing on an SPE Core in Cell Broadband EngineTM
Network Processing on an SPE Core in Cell Broadband EngineTMSlide_N
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...IJCSIS Research Publications
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...IJSRD
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 

Ähnlich wie Performance evaluation of ecc in single and multi( eliptic curve) (20)

An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...An area and power efficient on chip communication architectures for image enc...
An area and power efficient on chip communication architectures for image enc...
 
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
First phase slide presentation on "ANALYZING THE EFFECTIVENESS OF THE ADVANCE...
 
Accelerating Real Time Applications on Heterogeneous Platforms
Accelerating Real Time Applications on Heterogeneous PlatformsAccelerating Real Time Applications on Heterogeneous Platforms
Accelerating Real Time Applications on Heterogeneous Platforms
 
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
Synopsis on "ANALYZING THE EFFECTIVENESS OF THE ADVANCED ENCRYPTION STANDARD ...
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 
Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...Performance analysis and implementation of modified sdm based noc for mpsoc o...
Performance analysis and implementation of modified sdm based noc for mpsoc o...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...
 
Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...Designing of telecommand system using system on chip soc for spacecraft contr...
Designing of telecommand system using system on chip soc for spacecraft contr...
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
 
Cache performance-x86-2009
Cache performance-x86-2009Cache performance-x86-2009
Cache performance-x86-2009
 
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORSAFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
AFFECT OF PARALLEL COMPUTING ON MULTICORE PROCESSORS
 
Affect of parallel computing on multicore processors
Affect of parallel computing on multicore processorsAffect of parallel computing on multicore processors
Affect of parallel computing on multicore processors
 
Tdp.a029a10
Tdp.a029a10Tdp.a029a10
Tdp.a029a10
 
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
LOW AREA FPGA IMPLEMENTATION OF DROMCSLA-QTL ARCHITECTURE FOR CRYPTOGRAPHIC A...
 
Network Processing on an SPE Core in Cell Broadband EngineTM
Network Processing on an SPE Core in Cell Broadband EngineTMNetwork Processing on an SPE Core in Cell Broadband EngineTM
Network Processing on an SPE Core in Cell Broadband EngineTM
 
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
FPGA and ASIC Implementation of Speech Encryption and Decryption using AES Al...
 
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
Identifying the Performance Efficiency Of Attribute Based Encryption With Sec...
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 

Kürzlich hochgeladen

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Kürzlich hochgeladen (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Performance evaluation of ecc in single and multi( eliptic curve)

  • 1. arXiv:1401.3421v1[cs.AR]15Jan2014 Performance Evaluation of ECC in Single and Multi Processor Architectures on FPGA Based Embedded System Sruti Agarwal1,∗ , Sangeet Saha2 , Rourab Paul3 , Amlan Chakrabarti4 Abstract Cryptographic algorithms are computationally costly and the challenge is more if we need to execute them in resource constrained embedded systems. Field Programmable Gate Arrays (FPGAs) having programmable logic de- vices and processing cores, have proven to be highly feasible implementation platforms for embedded systems providing lesser design time and reconfig- urability. Design parameters like throughput, resource utilization and power requirements are the key issues. The popular Elliptic Curve Cryptography (ECC), which is superior over other public-key crypto-systems like RSA in many ways, such as providing greater security for a smaller key size, is cho- sen in this work and the possibilities of its implementation in FPGA based embedded systems for both single and dual processor core architectures in- volving task parallelization have been explored. This exploration, which is first of its kind considering the other existing works, is a needed activity for evaluating the best possible architectural environment for ECC implementa- tion on FPGA (Virtex4 XC4VFX12, FF668, -10) based embedded platform. Keywords: FPGA, ECC, single-core, dual-core, MicroBlaze, shared memory ∗ Corresponding author 1 Institute of RadioPhysics and Electronics, University of Calcutta, Kolkata. 2 CSE, University of Calcutta, Kolkata. 3 A.K.Choudhury School of I.T., University of Calcutta, Kolkata. 4 Senior Memeber IEEE, A.K.Choudhury School of I.T., University of Calcutta, Kolkata. Preprint submitted to ICCN-2013/ICDMW-2013/ICISP-2013 January 16, 2014
  • 2. 1. Introduction ECC is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. The use of elliptic curves in cryptography was suggested independently by Neal Koblitz[1] and Victor S. Miller[2] in 1985. Elliptic curve cryptography, in essence, entails using the group of points on an elliptic curve as the underlying number system for public key cryptography. The primary reason for using elliptic curves as a basis for public key crypto-systems is that elliptic curve based crypto-systems appear to provide better security than traditional crypto-systems for a given key size[4], thereby reducing the process overhead. One can take advantage of this fact to increase security, or (more often) to increase performance by reducing the key size while keeping the same security. Designers are now working on designing dedicated hardware accelerator blocks along with the main processor [5][7][8] to increase the throughput of the design. ECC algorithm is used for secured communication in smart cards[9] and also in GSM security[6]. So, high speed, resource constrained en- vironment is required. Using a dual-core instead of a dedicated co-processor enables the user to operate from the application layer without entering the subordinate layers. Also, the thread-level parallelism, used by the dual-core ensures higher throughput without increasing the much power, which is an important issue for low-power communication devices like smart cards. Im- plementations can be made in different platforms namely, FPGA or ASIC or can be done using micro-controllers. FPGAs provides reconfigurability and lesser design time, while ASIC provides better throughput though the de- sign time is large and expensive. We propose the design and implementation of Elliptic Curve Cryptography (ECC) encryption algorithm by developing suitable single core and dual core design on Xilinx Virtex 4 (ML403) device. The system is optimized in terms of execution speed. We perform a trade-off between throughput, power and resource requirements for our dual core im- plementation. To the best of our knowledge, dual-soft core processor based implementation of ECC in an FPGA is not yet available in related literatures and hence it is first of its kind. The paper is organized as follows: Section 2 details the overview of ECC, the encryption and decryption process. The design and implementation de- tails for single and dual-core processor architectures are described in Section 3. The experimental results are summarized in Section 4. Conclusion and References are briefed in Section 5. 2
  • 3. 2. Background This section provides some background on elliptic curves and ECC and then the hardness of decrypting the elliptic curve ciphers is also discussed. The idea of a multi processor system, establishment of communication be- tween the processors using shared memory and the needed data synchroniza- tion is also briefed in the later part of this section. 2.1. Elliptic Curves Elliptic curves are described by curves, which are similar to cubic equa- tions, used for calculating the circumference of an ellipse. In general, cubic equations for elliptic curves take the following form known as Weierstrass equation[3]: (y2 + axy + by) mod p = (x3 + cx2 + dx + e) mod p (1) where a, b,c, d, e, p are real numbers and x and y take on any values in the real numbers. For our purpose, it is sufficient to limit ourselves to equation of the form given in Equation2 for appropriate curve parameters of ECC. y2 mod p = (x3 + ax + b) mod p (2) Figure 1 shows an example of elliptic curve. P Q -(P + Q) (P + Q) -2 -1 0 1 2 3 0 2 -2 -4 4 4 6 Figure 1: Example of Elliptic Curve 3
  • 4. 2.2. Elliptic Curve Cryptography ECC can be used to encrypt a plain text message M into cipher text for secured communication. Firstly, the plain text message M is converted into a set of finite points PM (x, y), which lie in the elliptic curve Ep(a, b). A generator point, G ∈ Ep(a, b), is chosen next such that the smallest value of n for which nG = O is a very large prime number. The elliptic curve Ep(a, b) and the generator point G are then made public. Let there be two parties A and B who wish to communicate using ECC. Each user selects a private key, user A’s private key is nA, while nB is the private key for user B such that nA, nB <n. Then they compute their public keys. The public key of A is PA = nAG, while for B the public key is PB = nBG. To send the secret message to B, A encrypts the message point PM by choosing a random number k and computes the cipher text points CM using B’s public key. The cipher text is given by: CM = [(kG), (PM + kPB)] (3) On receiving the cipher text (pair of points) CM , B multiplies the first pair of points (kG) with his private key nB, and then adds the result to the second point of the cipher text (PM + kPB) i.e., (PM + kPB) − [nB(kG)] = (PM + knBG) − [nB(kG)] = PM (4) Plain text message point PM , corresponds to the message M. It is to be observed here that only B can remove nB(kG) from the second part of the cipher text. No, third party or intruder can know the message except B. Thus, ECC is very secured and can be relied for confidential communication. Breaking of ECC is a “hard problem”, which requires computing of discreet logarithm [3]. 2.3. Multi processor system A multi processor system consists of two or more processors working concurrently and capable of communicating with each other. Such a design tends to double the throughput, with two processors running independently, but with an extra cost of resource and power. On the other hand, a multi core system is one in which more than one processor is build on the same die. In FPGA we have on-chip soft processor cores, which has been utilized in our design to multi core design. There are some basic conditions required for the execution of a design in a multi core system. The primary being concurrency 4
  • 5. in the design i.e., no data dependency must be present in processes that run in different processors and also the two processors must have some handshaking for synchronization of data. Multi core processors often use a shared memory system or a Mailbox system as a interprocessor communication mechanism, that operates very quickly[11]. 2.4. Shared Memory In a multi core environment, mailbox and shared memory [12] are the two mechanisms, provided by Xilinx. Out of these two mechanisms, shared memory is the most common and most intuitive way of passing information between processing subsystems and we have used it in our design. A shared memory system has the following properties[12]: •Any processor can refer any location in the shared memory directly by some system call. •Location of data in memory is transparent to the programmer. Data could be distributed across multiple processors, with the help of some proper API, data can be handled at program level. •A synchronization is a must for accessing the shared memory segment by some hardware/software protocol between the two processors. Shared memory is typically the fastest asynchronous mode of communica- tion, especially when the information to be shared is large. Shared memory gives another approach of ”in-place” message processing schemes. Shared memory can be built out of on-chip local memory like BRAM or on external memory like DDR SDRAM. 2.5. Synchronization The region in which the shared data is stored is known as a Critical Region in operating system terminology. Unless there is some sort of well- defined non-conflicting way in which each processor accesses the shared data, the multi core system cannot work properly. A synchronization protocol or construct is usually required to serialize accesses to the shared resource. The XPS Mutex synchronization primitive is used in this work, which is provided by Xilinx as a separate IP-core[13]. When using Shared memory as a method of data communication, the pseudo code should look like this to ensure proper synchronization, /* shared tasks */ XMutex Lock (); 5
  • 6. /* Critical Region - Perform shared memory access */ XMutex Unlock (); By calling the XMutex Lock() it must be ensured that one processor is accessing the critical region and other processor should not be allowed to access the same until XMutex LocK () is called by that processor. 3. Design and Implementation This section highlights the key components of our proposed design. At first, we describe the processor that is used and then we brief the design innovations made to enhance the throughput. 3.1. MicroBlaze The MicroBlaze embedded processor soft core is a 32-bit Reduced In- struction Set Computer (RISC) optimized for implementation in FPGAs[10]. As a soft-core processor, MicroBlaze is implemented entirely in the general- purpose memory and logic fabric of Xilinx FPGAs. The Embedded Devel- opment Kit (EDK) platform from Xilinx has been used to build a complete processor system on FPGA. 3.2. ECC in Single MicroBlaze In a single processor architecture, the FPGA receives the input via the RS-232 port through UART and then the input plaintext message is en- crypted using ECC algorithm, which is running in the MicroBlaze processor of the the FPGA. After encryption, the cipher text is send back to the Host PC and is seen in the Hyper Terminal using serial communication between the board and the PC. Figure 2 shows the flow of steps in the design. Proces- sor working at 100MHz clock frequency is used to encrypt 8-bits of message using ECC. Scalar multiplication constitutes the main operation in ECC. It is seen that the processor takes 19.01 msec to perform the total encryption. The resource utilized i.e., the number of LUTs and slices required by the design as well as the power requirements are summarized in the table 2. 3.3. ECC in Dual MicroBlaze After evaluating the performance of ECC in single processor architecture by using MicroBlaze soft-core processor, another approach is taken to im- plement it in Dual processor architecture by considering the fact discussed in Section 2.3 for higher throughput and efficiency. Xilinx Virtex4 ML403 6
  • 7. Keys & Plaintext Ciphertext MicroBlaze Running ECC Block RAM Processor Local Bus (PLB) Local Memory Bus (LMB) BRAM Controller System UART 32 bit 32 bit Local Memory Bus (LMB) BRAM Controller Figure 2: Single MicroBlaze Architecture is taken as a platform for design. Shared memory is used for creating a handshaking between the two processors as described in Section 2.4 and the synchronization for communication is achieved using the process described in Section 2.5. Fig. 3 shows the architecture of Dual MicroBlaze design, PLB v46PLB v46 XPS_BRAMXPS_BRAM Boot Memory Boot Memory MicroBlaze 1 MicroBlaze 2 Multi Port Memory Controller SDRAM Shared Memory XPS_ Mutex-core Periph- eral for MB-2 Periph- eral for MB-1 Port A Port B PLB v46 PLB v46 Figure 3: Dual MicroBlaze Architectural flow In addition, multiple port memory controller (DDR SDRAM) and inter- processor communication-XPS Mutex hardware IP [13] is also incorporated in the test bed to facilitate the memory sharing and inter processor synchro- nization and communication. In the experiment, the two processors are equally engaged to execute ECC in parallel fashion and in between the consequent steps, the two pro- cessors communicate with each other via shared memory with proper syn- chronization. The message to be encrypted is transferred to the FPGA from 7
  • 8. a computer using RS232 serial port communication. The two multiplications are executed concurrently in two processors and the resulting data is assem- bled in the shared memory. The addition operation is then performed by the 1st processor and the resultant cipher text is generated. The resultant cipher text is send back to the PC using the RS232 interface and is viewed at the Hyper Terminal of the computer. Fig. 4 shows the mechanism in which the two processors communicate using the shared memory and using Mutex locking and unlocking. MicroBlaze-1 MircoBlaze-2 Multiplication (kG) Multiplication(kPb) DDR-SDRAM Mutex_Unlock Addition (Pm+kPb) 1st part of Cipher 2nd paprt of Cipher PLB v46 UART BRAM BRAM PLB=Processor Local Bus Encrypted message Output at Hyperterminal of Host PC Mutex_lock PLB v46 I/P THROUGH KEYBOARD Input plain text ECC ENCRYPTION Figure 4: ECC in Dual MicroBlaze 4. Result and Analysis It is seen that the encryption engine speeds up by 3.3 times as the pro- posed architecture takes only 5.72 msec to perform the encryption.The re- source estimation, power required and throughput measurements for both the designs are shown in Table 1 and Table 2 below. The design improves the throughput of execution, but utilizes more resources due to the dual cores. It is to be noted here that the throughput of the design can be improved further by enabling the cache memory. But due to the resource constraints of our implementation board the cache memory of the two processors could not be enabled. 5. Conclusion and Future Work This work is an exploration of ECC implementation for FPGA based embedded systems. Two specific designs have been addressed, the first one 8
  • 9. Table 1: For an encryption process Architecture Clock Freq. # clock Time Reqd. Throughput (in MHz) cycles reqd. (in msec) (bits per sec) Single-core Microblaze 100 1901317 19.01 420.83 Dual-core Microblaze 100 572552 5.72 1398.60 Table 2: Resource and Power Estimation for the encryption process Processor Clock Freq. # # Slice # 4-input Through Total Power (in MHz) Slices FFs LUTs put per slice (in Watts) Single-core 100 3580 3750 4076 0.1175 1.106 Microblaze Dual-core 100 5313 6637 7495 0.2632 1.808 Microblaze is simpler involving a single Microblaze core whereas the other one utilizes two Microblaze cores and thus enables multi-threading. The dual core based implementation gives almost a 3 times increase in the throughput but utilizes almost twice the resource and 30% more power as compared to the single core based implementation. This clearly shows a trade off between speed, resource utilization and power requirement. In future we look forward to do a further exploration of ECC implementation for embedded applications involving FPGA based hard processor cores and ASIC based design. References [1] Koblitz Neal, “Elliptic Curve Cryptosystems,” Mathematics of Compu- tation 48 , (177): 203–209. JSTOR 2007884. [2] Miller Victor, “Use of elliptic curves in cryptography,” CRYPTO 85 : 417–426 doi : 10.1007/3 − 540 − 39799 − X 31. [3] Stalling William, “Cryptography and Network Security: Principles and Practice (6th Edition),” , ISBN: 0133354695. [4] Batina L., Ors S., Preneel B., Vandewalle J., “Hardware architectures for public key cryptography,” Integration, the VLSI Journal, 34(1-2):1- 64, 2003. 9
  • 10. [5] Sozzani Fabio, Bertoni Guido, Turcato Stefano, Breveglieri Luco and Milano P, “A parallelized design for an Elliptic Curve Cryptosystem Coprocessor,” in Proceedings of the International Conference on Infor- mation Technology: Coding and Computing (ITCC05), IEEE, 0–7695– 2315–3/05. [6] Goswami Sukalyan, Laha Subarna, Chakraborty Satarupa, Dhar Ankana, “Enhancement of GSM Security Using Elliptic Curve Cryp- tography Algorithm,” inThird International Conference on Intelligent Systems Modelling and Simulation, DOI 10.1109/ISMS.2012.137. [7] McIvor J. Ciaran, McLoone Maire, McCanny V. John, “Hardware Ellip- tic Curve Cryptographic Processor Over GF(p),” in IEEE Transactions on Circuits and Systems-I, vol. 53, No. 9, pp. 1051–7122, 2006. [8] Fan Junfeng, Sakiyama Kazuo and Verbauwhede Ingrid, “Elliptic curve cryptography on embedded multicore systems,” in Journal on Design Automation for Embedded Systems, vol. 12, pp.231–242, 2008. [9] Abdurahmonov Tursun, Yeoh Eng-Thiam and Mohamed Hussain Helmi, “Improving Smart Card Security Using Elliptic Curve Cryptography over Prime Field (Fp),” in Artificial Intelligence, NPD, SCI 368, pp.127– 140, 2011. [10] “MicroBlaze Processor Reference Guide, Em- bedded Development Kit EDK 10.1i,” in, http : //www.xilinx.com/support/documentation/sw manuals/mb ref guide.pdf. [11] William Wong, “Baisc of design,Embedded Processor,” http : //electronicdesign.com/embedded/embedded − processors [12] Vasanth Asokan., “Designing Multiprocessor Systems in Plat- form Studio,” in White Paper: Xilinx Platform Studio (XPS), http : //www.xilinx.com/support/documentation/white papers/wp262.pdf. [13] “XAPP996,Xilinx application note on Dual Processor,” in, http : //www.xilinx.com/support/documentation/application notes/xapp996.pdf. 10
  • 11. Authors’ Instructions for the Preparation of Camera-Ready Manuscript to Elsevier Proceedings Venugopal K Ra,1,∗ , L M Patnaikb,2 a University Visvesvaraya College of Engineering, Bangalore University, Bangalore. b Honorary Professor, Indian Institute of Science, Bangalore. Abstract The abstract should summarize the contents of the paper and should contain at least 70 and at most 150 words. It should be written using the abstract environment. Keywords: We would like to encourage you to list your keywords within the abstract section. 1. Introduction You are strongly encouraged to use LATEX for the preparation of your camera-ready manuscript together with the corresponding Elsevier style file. The LATEX source of this instruction file for LATEX users may be used as a template. This is located in the Guidelines for authors link in elsevier.com link. Kindly send the final checked source and PDF files of your paper to the Contact Volume Editor. This is usually one of the organizers of the conference. Make sure that the LATEX and the PDF files are identical and correct and that only one version of your paper is sent. Since it is impossible to update files at a later stage. Please do not send the printed paper. The papers once published cannot be updated or changed at any cost. This applies to both the printed book and the online version of the publica- tion. Every detail, including the order of the names of the authors, should be checked before the paper is sent to the Volume Editors. ∗ Corresponding author URL: http://www.venugopalkr.com (Venugopal K R) 1 Principal, University Visvesvaraya College of Engineering, Bangalore. 2 Honorary Professor, Indian Institute of Science, Bangalore. Preprint submitted to ICCN-2013/ICDMW-2013/ICISP-2013 September 18, 2012
  • 12. 1.1. Checking the PDF File Kindly assure that the Contact Volume Editor is given the name and email address of the contact author for your paper. In some cases, it is the Contact Volume Editor that checks all the final pdfs. In such cases, the authors are not involved in the checking phase. 1.2. Additional Information Required by the Volume Editor If you have more than one surname, please make sure that the Volume Editor knows how you are to be listed in the author index. 1.3. Copyright Forms The copyright form may be downloaded from the For Authors section of the Elsevier Website: www.elsevier.com. Please send your signed copyright form to the Contact Volume Editor as a scanned pdf. One author may sign on behalf of all of the other authors of a particular paper. 2. Floats Figures may be included using the command, includegraphics in combi- nation with or without its several options to further control graphic. include- graphics is provided by graphic[s,x].sty which is part of any standard LATEX distribution. A graphicx.sty is loaded by default. LATEX accepts figures in postscript format while A pdfLATEX. AT X accepts *.pdf, *.mps (metapost), *.jpg and *.png formats. pdfLATEX does not accept graphic files in postscript format. The table environment is handy for marking up tabular material. If users want to use multirow.sty, array.sty, etc., to fine control/enhance the tables, they are welcome to load any package of their choice and elsarticle.cls will work in combination with all loaded packages. 2.0.1. Headings. Headings should be capitalized (i.e., nouns, verbs, and all other words except articles, prepositions, and conjunctions should be set with an initial capital) and should, with the exception of the title, be aligned to the left. Words joined by a hyphen are subject to a special rule. If the first word can stand alone, the second word should be capitalized. 2
  • 13. 2.0.2. Lemmas, Propositions, and Theorems. The numbers accorded to lemmas, propositions, and theorems, etc. should appear in consecutive order, starting with Lemma 1, and not, for example, with Lemma 11. 2.1. Figures For LATEX users, we recommend using the graphics or graphicx package. Please check that the lines in line drawings are not interrupted and are of a constant width. Grids and details within the figures must be clearly legible and may not be written one on top of the other. Line drawings should have a resolution of at least 800 dpi (preferably 1200 dpi). The lettering in figures should have a height of 2 mm (10-point type). Figures should be numbered and should have a caption which should always be positioned under the figures, in contrast to the caption belonging to a table, which should always appear above the table; this is simply achieved as matter of sequence in your source. Please center the figures or your tabular material. Short captions are centered by default between the margins and typeset in 9-point type. The distance between text and figure is preset to be about 8 mm, the distance between figure and caption about 6 mm. To ensure that the reproduction of your illustrations is of a reasonable quality, we advise against the use of shading. The contrast should be as pronounced as possible. If screenshots are necessary, please make sure that you are happy with the print quality before you send the files. Use the format to generate the Figure 1. 2.2. Itemization (i) Find maximum number of keymatches between the communicating nodes. (ii) Choosing a secure path based on the Link Strength. 2.3. Table The notations used in this paper are given in Table 1. 3
  • 14. A C D E B Figure 1: Connectivity of Sleep Nodes. Table 1: Notations Symbols Definition dst Destination Node src Source Node Rnd() Pseudo Random Generating Function Kr Maximum possible value that is generated 2.4. Formulas Displayed equations or formulas are centered and set on a separate line (with an extra line or halfline space above and below). Displayed expressions should be numbered for reference. The numbers should be consecutive within each section or within the contribution, with numbers enclosed in parentheses and set on the right margin –which is the default if you use the equation environment, e.g., P m = P! m!(P − m)! (1) Equations should be punctuated in the same way as ordinary text but with a small space before the end punctuation mark. 2.5. Footnotes The superscript numeral used to refer to a footnote appears in the text either directly after the word to be discussed or – in relation to a phrase or a sentence – following the punctuation sign (comma, semicolon, or period). 4
  • 15. Table 2: Algorithm: Secure QoS-Aware Data Fusion (SQDF) First Phase begin Send Data Packet end Second Phase begin Receive Data Packet if(malicious node) Reset the timer else Reset the timer for deffer time Fuses data end Footnotes should appear at the bottom of the normal text area, with a line of about 2 cm set immediately above them.3 2.6. Citations For citations in the text please use square brackets and consecutive num- bers: [1], [2], [3] – provided automatically by LATEX. 2.7. Page Numbering and Running Heads There is no need to include page numbers. If your paper title is too long it will be shortened. 2.8. Algorithm Place the algorithm within a box as shown in Table 2. 3. Graphs The graphs are shown in Figure 2 and Figure 3. 3 The footnote numeral is set flush left and the text follows with the usual word spacing. 5
  • 16. 50 55 60 65 70 75 80 85 90 95 60 70 80 90 100 110 120 Percentageofsleepnodes Communication Radius - Rc (m) No. of nodes=100 No. of nodes=200 No. of nodes=300 No. of nodes=400 Figure 2: Percentage of Sleep Nodes. 0 1 2 3 4 5 6 7 8 60 70 80 90 100 110 120 PercentageofnodesactiveforCommunication Communication Radius - Rc (m) No. of nodes=100 No. of nodes=200 No. of nodes=300 No. of nodes=400 Figure 3: Percentage of Communication Unit Active Nodes. 4. Conclusions Check List before submission of the final manuscript. The final LATEX source files A final PDF file A copyright form, signed by one author on behalf of all of the authors of the paper. A readme giving the name and email address of the corresponding author. Appendix If any mathematical derivations or theoretical concepts are exisiting, in- clude in the Appendix. Acknowledgments. The previous work authors can be appreciated or the funding agencies can be acknowledged. 6
  • 17. 5. The References Section In order to permit cross referencing standardizing format has to be used in the references. References that don’t adhere to this style will be reformatted by Elsevier. You should therefore check your references thoroughly when you receive the final pdf of your paper. The reference section must be complete. You may not omit references. The following section shows a sample reference list with entries for pro- ceedings without editors [1], journal articles [2], transactions [3], a book [4], URL [5]. References [1] F. L. Lewis, D. J. Cook, S. K. Dasm and John Wiley, “Wireless Sensor Networks,” in Proceedings Smart Environment Technologies, Protocols and Applications, New York, 2004, pp. 1–18. [2] Kui Ren, Kai Zeng and Wenjing Lou, “A New Approach for Random Key Pre-distribution in Large-Scale Wireless Sensor Networks,” in Jour- nal on Wireless Communications and Mobile Computing, vol. 6, pp. 307–318, 2006. [3] Chia-Mu Yu, Chun-Shien Lu and Sy-Yen Kuo, “Noninteractive Pairwise Key Establishment for Wireless Sensor Networks,” in IEEE Transac- tions on Information Forensics and Security, vol. 5, no. 3, pp. 556–569, 2010. [4] Raj Jain, “Art of Computer System Performance Analysis,” in Wiley India Pvt. Ltd, 2009, pp. 198–200. [5] http : //www.statcac.com/statistics/correlation − regression. 7