Efficient Elliptic Curve Cryptography for Embedded Devices

被引:6
|
作者
Liu, Zhe [1 ,2 ]
Weng, Jian [3 ]
Hu, Zhi [4 ]
Seo, Hwajeong [5 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON, Canada
[2] Univ Waterloo, Dept Combinator & Optimizat, Waterloo, ON, Canada
[3] Jinan Univ, Dept Comp Sci, Jinan, Peoples R China
[4] Cent South Univ, Sch Math & Stat, Changsha 410083, Hunan, Peoples R China
[5] Inst Infocomm Res I2R, Singapore, Singapore
关键词
Elliptic curve; optimal prime fields; scalar multiplication; 8-bit AVR microcontroller; SIMPLE POWER ANALYSIS; MODULAR MULTIPLICATION; IMPLEMENTATION; REDUCTION;
D O I
10.1145/2967103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Many resource-constrained embedded devices, such as wireless sensor nodes, require public key encryption or a digital signature, which has induced plenty of research on efficient and secure implementation of elliptic curve cryptography (ECC) on 8-bit processors. In this work, we study the suitability of a special class of finite fields, called optimal prime fields (OPFs), for a "lightweight" ECC implementation with a view toward high performance and security. First, we introduce a highly optimized arithmetic library for OPFs that includes two implementations for each finite field arithmetic operation, namely a performance-optimized version and a security-optimized variant. The latter is resistant against simple power analysis attacks in the sense that it always executes the same sequence of instructions, independent of the operands. Based on this OPF library, we then describe a performance-optimized and a security-optimized implementation of scalar multiplication on the elliptic curve over OPFs at several security levels. The former uses the Gallant-Lambert-Vanstone method on twisted Edwards curves and reaches an execution time of 3.14M cycles (over a 160-bit OPF) on an 8-bit ATmega128 processor, whereas the latter is based on a Montgomery curve and executes in 5.53M cycles.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] An efficient and secure RFID authentication protocol using elliptic curve cryptography
    Negin Dinarvand
    Hamid Barati
    [J]. Wireless Networks, 2019, 25 : 415 - 428
  • [42] Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things
    Han Shen
    Jian Shen
    Muhammad Khurram Khan
    Jong-Hyouk Lee
    [J]. Wireless Personal Communications, 2017, 96 : 5253 - 5266
  • [43] Implementation and Performance Analysis of Elliptic Curve Cryptography using an Efficient Multiplier
    Renita, J.
    Elizabeth, Edna N.
    Asokan, Nandhini
    [J]. JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2022, 22 (02) : 53 - 60
  • [44] Efficient Implementation of Cryptography on Points of an Elliptic Curve in Residue Number System
    Bahenko, Mikhail
    Redvanov, Aziz Salimovich
    Deryabin, Maxim
    Chervyakov, Nikolay
    Nazarov, Anton
    Al-Galda, Safwat Chiad
    Vashchenko, Irina
    Dvoryaninova, Inna
    Nepretimova, Elena
    [J]. 2019 INTERNATIONAL CONFERENCE ON ENGINEERING AND TELECOMMUNICATION (ENT), 2019,
  • [45] FPGA-Based Efficient Modular Multiplication for Elliptic Curve Cryptography
    Hossain, Md Selim
    Kong, Yinan
    [J]. 25TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC 2015), 2015, : 191 - 195
  • [46] Combining Point Operations for Efficient Elliptic Curve Cryptography Scalar Multiplication
    Leca, Cristian-Liviu
    Rincu, Cristian-Iulian
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [47] Efficient implementation of cancelable face recognition based on elliptic curve cryptography
    Eltaieb, Rania A. A.
    El-Banby, Ghada M. M.
    El-Shafai, Walid
    Abd El-Samie, Fathi E. E.
    Abbas, Alaa M. M.
    [J]. OPTICAL AND QUANTUM ELECTRONICS, 2023, 55 (09)
  • [48] iTrust-A Trustworthy and Efficient Mapping Scheme in Elliptic Curve Cryptography
    Almajed, Hisham
    Almogren, Ahmad
    Alabdulkareem, Mohammed
    [J]. SENSORS, 2020, 20 (23) : 1 - 20
  • [49] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Jue-Sam Chou
    [J]. The Journal of Supercomputing, 2014, 70 : 75 - 94
  • [50] Efficient arithmetic in finite field extensions with application in elliptic curve cryptography
    Bailey, DV
    Paar, C
    [J]. JOURNAL OF CRYPTOLOGY, 2001, 14 (03) : 153 - 176