Research Progress on Efficient Software Implemenation of Elliptic Curve Cryptography

被引:0
|
作者
Dong J.-K. [1 ,5 ]
Liu Z. [2 ]
Lu S. [1 ]
Zheng F.-Y. [3 ]
Lin J.-Q. [4 ]
Xiao F. [1 ]
Ge C.-P. [2 ]
机构
[1] School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing
[2] School of Computer Science, Nanjing University of Aeronautics and Astronautics, Nanjing
[3] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[4] School of Cyber Security, University of Science and Technology of China, Hefei
[5] Zhengzhou Xinda Institute of Advanced Technology, Zhengzhou
来源
关键词
cloud computing; cryptographic engineering; elliptic curve cryptography; Internet of Things; public key cryptography;
D O I
10.11897/SP.J.1016.2023.00909
中图分类号
学科分类号
摘要
With the rapid development of cloud computing technology and Internet of Things technology, user-sensitive data shows explosive growth. In order to ensure the security of user privacy data in the network, the state has successively issued a series of laws and regulations with the "Cryptography Law" as the core, which defines the standard requirements of cryptography application. Whether it is the service side represented by cloud computing or the terminal side represented by the Internet of Things, complex public-key cryptography computing power is facing great challenges. Public key cryptography algorithm is one of the core algorithms of cryptography, which is widely used in digital signature, key exchange, public key encryption and other cryptographic primitives. In 1987, ECCCElliptic Curve Cryptography) algorithm based on elliptic curve discrete logarithm problem first came into the view of researchers. Compared with the traditional RSA algorithm, the elliptic curve algorithm has a shorter key length and has important advantages in computing speed, resource storage, data bandwidth, etc. It can be used to realize key exchange, digital signature, public-key encryption, and other cryptographic primitives. It is one of the most widely used public-key cryptography technologies. How to implement elliptic curve public key cryptosystem with high computational complexity safely and efficiently has always been a challenging topic for cryptographers. With the growing demand for application cryptography, the research on the implementation of high-performance elliptic curve public key cryptography algorithms presents a new development trend, but also brings about corresponding problems. In the cloud computing scenario, the server hardware itself has the characteristics of high performance computing capacity, large memory, etc. In the scenario of the Internet of Things, due to the massive deployment of terminal equipment, the hardware cost is limited, and the ROM space resources of a large number of low-end processor devices are seriously insufficient. However, a large number of application scenarios (such as intelligent transportation, intelligent medical treatment, etc.) have strict requirements on the delay of cryptographic algorithms. On the server side, the main requirements of cloud computing oriented elliptic curve cryptography algorithm computing technology are: high throughput, low latency, and high security; On the terminal side, the requirements of the elliptic curve cryptography algorithm for the Internet of Things are: lightweight, high-performance, and high security. Due to the differences between hardware platforms and requirements, they must be studied separately to ensure that both sides of the end cloud can meet the current development trend of the Internet of Everything. This article briefly analyzes two different application scenarios on the server side and the terminal side and clarifies the huge differences in software and hardware and cryptographic algorithm requirements on both sides of the terminal and cloud. Furthermore, the standards of various elliptic curve cryptography algorithms and the parameters of the hardware development platform are summarized. Based on the above content, this paper summarizes the efficient software implementation technology of elliptic curve cryptography, mainly introduces the research status of domestic elliptic curve cryptography, and looks forward to the future development trend of elliptic curve cryptography algorithm implementation. © 2023 Science Press. All rights reserved.
引用
收藏
页码:909 / 928
页数:19
相关论文
共 130 条
  • [1] Diffie W, Hellman M., New directions in cryptography, IEEE Transactions on Information Theory, 22, 6, pp. 644-654, (1976)
  • [2] Rivest R L, Shamir A, Athenian L M., A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21, 2, pp. 120-126, (1978)
  • [3] Barker E, Burr W, Et al., Recommendation for key management: Parti: General [M], (2006)
  • [4] Koblitz N., Elliptic curve cryptosystems, Mathematics of Computation, 48, 177, pp. 203-209, (1987)
  • [5] Zhang Yin, Wang Chao, Research on the implementation of elliptic curve cryptosystem, 1994 Proceedings of Advances in Theoretical Computer Science, pp. 104-108, (1994)
  • [6] Xu Qiu-Liang, Li Da-Xing, Elliptic curve cryptosystem, Journal of Computer Research and Development, 36, 11, (1999)
  • [7] Chen Xiao-Feng, Wang Yu-Min, Research and development of public key crypt osyst em, Journal on Communications, 25, 8, pp. 109-118, (2004)
  • [8] Liu Duo, Dai Yi-Qi, Wang DaoShun, Stability and balance-Strategies and methods for anti-side-channel attacks in elliptic-curve cryptosystems, Journal of Computer Research and Development, 42, 10, pp. 1667-1672, (2005)
  • [9] Harkanson R, Kim Y., Applications of elliptic curve cryptography
  • [10] A light introduction to elliptic curves and a survey of their applications, Proceedings of the 12th Annual Conference on Cyber and Information Security Research, pp. 1-7, (2017)