Reference : Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-...
Scientific journals : Article
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/27839
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes
English
Liu, Zhe [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Seo, Hwajeong [Pusan National University > School of Computer Science and Engineering]
Groszschädl, Johann mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Kim, Howon [Pusan National University > School of Computer Science and Engineering]
Jul-2016
IEEE Transactions on Information Forensics and Security
IEEE Signal Processing Society
11
7
1385-1397
Yes (verified by ORBilu)
International
1556-6013
[en] Wireless Sensor Networks ; Elliptic Curve Cryptography ; NIST Curve P192 ; Scalar Multiplication ; Multiple-Precision Arithmetic
[en] In this paper, we introduce a highly optimized software implementation of standards-compliant elliptic curve cryptography (ECC) for wireless sensor nodes equipped with an 8-bit AVR microcontroller. We exploit the state-of-the-art optimizations and propose novel techniques to further push the performance envelope of a scalar multiplication on the NIST P-192 curve. To illustrate the performance of our ECC software, we develope the prototype implementations of different cryptographic schemes for securing communication in a wireless sensor network, including elliptic curve Diffie-Hellman (ECDH) key exchange, the elliptic curve digital signature algorithm (ECDSA), and the elliptic curve Menezes-Qu-Vanstone (ECMQV) protocol. We obtain record-setting execution times for fixed-base, point variable-base, and double-base scalar multiplication. Compared with the related work, our ECDH key exchange achieves a performance gain of roughly 27% over the best previously published result using the NIST P-192 curve on the same platform, while our ECDSA performs twice as fast as the ECDSA implementation of the well-known TinyECC library. We also evaluate the impact of Karatsuba's multiplication technique on the overall execution time of a scalar multiplication. In addition to offering high performance, our implementation of scalar multiplication has a highly regular execution profile, which helps to protect against certain side-channel attacks. Our results show that NIST-compliant ECC can be implemented efficiently enough to be suitable for resource-constrained sensor nodes.
http://hdl.handle.net/10993/27839
10.1109/TIFS.2015.2491261
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7299326

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Limited access
TIFS2016.pdfPublisher postprint5 BRequest a copy

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.