Efficient Elliptic Curve Cryptography for Embedded Devices

被引:6
|
作者
Liu, Zhe [1 ,2 ]
Weng, Jian [3 ]
Hu, Zhi [4 ]
Seo, Hwajeong [5 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON, Canada
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON, Canada
[3] Jinan Univ, Dept Comp Sci, Jinan, Peoples R China
[4] Cent South Univ, Sch Math & Stat, Changsha 410083, Hunan, Peoples R China
[5] Inst Infocomm Res I2R, Singapore, Singapore
关键词
Elliptic curve; optimal prime fields; scalar multiplication; 8-bit AVR microcontroller; SIMPLE POWER ANALYSIS; MODULAR MULTIPLICATION; IMPLEMENTATION; REDUCTION;
D O I
10.1145/2967103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many resource-constrained embedded devices, such as wireless sensor nodes, require public key encryption or a digital signature, which has induced plenty of research on efficient and secure implementation of elliptic curve cryptography (ECC) on 8-bit processors. In this work, we study the suitability of a special class of finite fields, called optimal prime fields (OPFs), for a "lightweight" ECC implementation with a view toward high performance and security. First, we introduce a highly optimized arithmetic library for OPFs that includes two implementations for each finite field arithmetic operation, namely a performance-optimized version and a security-optimized variant. The latter is resistant against simple power analysis attacks in the sense that it always executes the same sequence of instructions, independent of the operands. Based on this OPF library, we then describe a performance-optimized and a security-optimized implementation of scalar multiplication on the elliptic curve over OPFs at several security levels. The former uses the Gallant-Lambert-Vanstone method on twisted Edwards curves and reaches an execution time of 3.14M cycles (over a 160-bit OPF) on an 8-bit ATmega128 processor, whereas the latter is based on a Montgomery curve and executes in 5.53M cycles.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Investigation into the Elliptic Curve Cryptography
    Fang, Xianjin
    Wu, Yanting
    [J]. 2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 412 - 415
  • [32] Elliptic curve cryptography engineering
    Cilardo, A
    Coppolino, L
    Mazzocca, N
    Romano, L
    [J]. PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 395 - 406
  • [33] The Price of Security: A Detailed Comparison of the TLS Handshake Performance on Embedded Devices When Using Elliptic Curve Cryptography and RSA
    Koschuch, Manuel
    Hudler, Matthias
    Krueger, Michael
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 71 - 83
  • [34] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Chou, Jue-Sam
    [J]. JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 75 - 94
  • [35] An Efficient E-Coin Scheme Under Elliptic Curve Cryptography
    Aboud, Sattar
    Al-Fayoumi, Mohammad
    Al-Fayoumi, Mustafa
    Saraireh, Jaafer A. L.
    [J]. 2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 185 - 190
  • [36] Efficient implementation of cancelable face recognition based on elliptic curve cryptography
    Rania A. Eltaieb
    Ghada M. El-Banby
    Walid El-Shafai
    Fathi E. Abd El-Samie
    Alaa M. Abbas
    [J]. Optical and Quantum Electronics, 2023, 55
  • [37] Efficient hardware implementation of elliptic curve cryptography over GF(pm)
    Lee, MK
    Kim, KT
    Kim, H
    Kim, DK
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 207 - 217
  • [38] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Dinarvand, Negin
    Barati, Hamid
    [J]. WIRELESS NETWORKS, 2019, 25 (01) : 415 - 428
  • [39] Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography
    Daniel V. Bailey
    Christof Paar
    [J]. Journal of Cryptology, 2001, 14 : 153 - 176
  • [40] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Shen, Han
    Shen, Jian
    Khan, Muhammad Khurram
    Lee, Jong-Hyouk
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5253 - 5266