Security

Verilog Implementation of Elliptic Curve Cryptosystem (ECC)

Free registration required

Executive Summary

Data Encryption is widely used to ensure security in open networks such as the internet with the fast development of cryptography research and computer technology. The capabilities of cryptosystems such as of RSA & Diffie-Hellman are inadequate due the requirement of large number of bits. The cryptosystem based on Elliptic Curve Cryptography (ECC) is becoming the recent trend of public key cryptography. The whole implementation includes three parts: key generation, encryption and decryption process. Verilog code for encryption and decryption is achieved and implemented in Xilinx and also simulated in NC Launch and synthesized in RTL Compiler of Cadence.

  • Format: PDF
  • Size: 1095.68 KB