Efficient Elliptic Curve Cryptography for Embedded Devices

被引:6
|
作者
Liu, Zhe [1 ,2 ]
Weng, Jian [3 ]
Hu, Zhi [4 ]
Seo, Hwajeong [5 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON, Canada
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON, Canada
[3] Jinan Univ, Dept Comp Sci, Jinan, Peoples R China
[4] Cent South Univ, Sch Math & Stat, Changsha 410083, Hunan, Peoples R China
[5] Inst Infocomm Res I2R, Singapore, Singapore
关键词
Elliptic curve; optimal prime fields; scalar multiplication; 8-bit AVR microcontroller; SIMPLE POWER ANALYSIS; MODULAR MULTIPLICATION; IMPLEMENTATION; REDUCTION;
D O I
10.1145/2967103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many resource-constrained embedded devices, such as wireless sensor nodes, require public key encryption or a digital signature, which has induced plenty of research on efficient and secure implementation of elliptic curve cryptography (ECC) on 8-bit processors. In this work, we study the suitability of a special class of finite fields, called optimal prime fields (OPFs), for a "lightweight" ECC implementation with a view toward high performance and security. First, we introduce a highly optimized arithmetic library for OPFs that includes two implementations for each finite field arithmetic operation, namely a performance-optimized version and a security-optimized variant. The latter is resistant against simple power analysis attacks in the sense that it always executes the same sequence of instructions, independent of the operands. Based on this OPF library, we then describe a performance-optimized and a security-optimized implementation of scalar multiplication on the elliptic curve over OPFs at several security levels. The former uses the Gallant-Lambert-Vanstone method on twisted Edwards curves and reaches an execution time of 3.14M cycles (over a 160-bit OPF) on an 8-bit ATmega128 processor, whereas the latter is based on a Montgomery curve and executes in 5.53M cycles.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] ELLIPTIC CURVE CRYPTOGRAPHY FOR CONSTRAINED DEVICES IN INTERNET OF THINGS AND INDUSTRY 4.0
    Cvrcek, Tadeas
    [J]. PROCEEDINGS II OF THE 26TH CONFERENCE STUDENT EEICT 2020, 2020, : 48 - 51
  • [22] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [23] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
  • [24] Elliptic Curve Cryptography on PocketPCs
    Edoh, Kossi
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (03): : 23 - 33
  • [25] Elliptic Curve Cryptography in Practice
    Bos, Joppe W.
    Halderman, J. Alex
    Heninger, Nadia
    Moore, Jonathan
    Naehrig, Michael
    Wustrow, Eric
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 157 - 175
  • [26] Elliptic-curve cryptography
    Fernandes, AD
    [J]. DR DOBBS JOURNAL, 1999, 24 (12): : 56 - +
  • [27] The State of Elliptic Curve Cryptography
    Neal Koblitz
    Alfred Menezes
    Scott Vanstone
    [J]. Designs, Codes and Cryptography, 2000, 19 : 173 - 193
  • [28] A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY
    Aydin, M. Ali
    Aydin, G. Zeynep
    [J]. ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 211 - 221
  • [29] A survey of elliptic curve cryptography
    Istanbul University, Engineering Faculty, Computer Engineering Dept., 34320 Avcilar, Istanbul, Turkey
    [J]. Istanb. Univ. J. Electr. Electron. Eng., 2006, 2 (211-221):
  • [30] Research on elliptic curve cryptography
    Qiu, QZ
    Xiong, QX
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 698 - 701