Efficient Elliptic Curve Cryptography for Embedded Devices

被引:6
|
作者
Liu, Zhe [1 ,2 ]
Weng, Jian [3 ]
Hu, Zhi [4 ]
Seo, Hwajeong [5 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON, Canada
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON, Canada
[3] Jinan Univ, Dept Comp Sci, Jinan, Peoples R China
[4] Cent South Univ, Sch Math & Stat, Changsha 410083, Hunan, Peoples R China
[5] Inst Infocomm Res I2R, Singapore, Singapore
关键词
Elliptic curve; optimal prime fields; scalar multiplication; 8-bit AVR microcontroller; SIMPLE POWER ANALYSIS; MODULAR MULTIPLICATION; IMPLEMENTATION; REDUCTION;
D O I
10.1145/2967103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many resource-constrained embedded devices, such as wireless sensor nodes, require public key encryption or a digital signature, which has induced plenty of research on efficient and secure implementation of elliptic curve cryptography (ECC) on 8-bit processors. In this work, we study the suitability of a special class of finite fields, called optimal prime fields (OPFs), for a "lightweight" ECC implementation with a view toward high performance and security. First, we introduce a highly optimized arithmetic library for OPFs that includes two implementations for each finite field arithmetic operation, namely a performance-optimized version and a security-optimized variant. The latter is resistant against simple power analysis attacks in the sense that it always executes the same sequence of instructions, independent of the operands. Based on this OPF library, we then describe a performance-optimized and a security-optimized implementation of scalar multiplication on the elliptic curve over OPFs at several security levels. The former uses the Gallant-Lambert-Vanstone method on twisted Edwards curves and reaches an execution time of 3.14M cycles (over a 160-bit OPF) on an 8-bit ATmega128 processor, whereas the latter is based on a Montgomery curve and executes in 5.53M cycles.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Securing Resource Constraints Embedded Devices Using Elliptic Curve Cryptography
    Tam, Tony
    Alfasi, Mohamed
    Mozumdar, Mohammad
    [J]. SENSORS AND SYSTEMS FOR SPACE APPLICATIONS VII, 2014, 9085
  • [2] Efficient implementation of elliptic curve cryptography (ECC) on embedded media processors
    Hu, Y
    Li, Q
    Huang, L
    Kuo, CCJ
    [J]. VISUAL COMMUNICATIONS AND IMAGE PROCESSING 2004, PTS 1 AND 2, 2004, 5308 : 132 - 143
  • [3] Elliptic curve cryptography on embedded multicore systems
    Junfeng Fan
    Kazuo Sakiyama
    Ingrid Verbauwhede
    [J]. Design Automation for Embedded Systems, 2008, 12 : 231 - 242
  • [4] Elliptic curve cryptography on embedded multicore systems
    Fan, Junfeng
    Sakiyama, Kazuo
    Verbauwhede, Ingrid
    [J]. DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2008, 12 (03) : 231 - 242
  • [5] Design of an Efficient Elliptic Curve Cryptography Coprocessor
    MuthuKumar, B.
    Jeevananthan, Dr. S.
    [J]. FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 34 - +
  • [6] Efficient Architectures for Elliptic Curve Cryptography Processors for RFID
    Leinweber, Lawrence
    Papachristou, Christos
    Wolff, Francis G.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, 2009, : 372 - 377
  • [7] EFFICIENT IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY IN WIRELESS SENSORS
    Aranha, Diego F.
    Dahab, Richardo
    Lopez, Julio
    Oliveira, Leonardo B.
    [J]. ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2010, 4 (02) : 169 - 187
  • [8] Efficient multiplication in GF(pk) for elliptic curve cryptography
    Bajard, JC
    Imbert, L
    Nègre, C
    Plantard, T
    [J]. 16TH IEEE SYMPOSIUM ON COMPUTER ARITHMETIC, PROCEEDINGS, 2003, : 181 - 187
  • [9] Implementation of elliptic-curve cryptography on mobile healthcare devices
    Malhotra, K.
    Gardner, S.
    Patz, R.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING, AND CONTROL, VOLS 1 AND 2, 2007, : 239 - 244
  • [10] Elliptic Curve Cryptography for Real Time Embedded Systems in IoT Networks
    Dhillon, Parwinder Kaur
    Kalra, Sheetal
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND EMBEDDED SYSTEMS (WECON), 2016, : 117 - 122