Paper published in a book (Scientific congresses, symposiums and conference proceedings)
Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers
Franck, Christian; Groszschädl, Johann; Le Corre, Yann et al.
2018In Awan, Irfan; Younas, Muhammad; Portela, Filipe (Eds.) Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops (W-FICLOUD 2018)
Peer reviewed
 

Files


Full Text
EMSICC2018.pdf
Author postprint (242.65 kB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
Elliptic Curve Cryptography; Pseudo-Mersenne Prime; Modular Arithmetic; Multiple-Precision Arithmetic; ARM Cortex-M3; Early-Termination Effect
Abstract :
[en] The number of smart devices connected to the Internet is growing at an enormous pace and will reach 30 billion within the next five years. A large fraction of these devices have limited processing capabilities and energy supply, which makes the execution of computation-intensive cryptographic algorithms very costly. This problem is exacerbated by the fact that basic optimization techniques like loop unrolling can not (always) be applied since cryptographic software for the IoT often needs to meet strict constraints on code size to not exceed the program storage capacity of the target device. In this paper we introduce SECCCM3, a "lightweight" software library for scalable elliptic curve cryptography on ARM Cortex-M3 microcontrollers. The current version of SECCCM3 is able to carry out variable-base scalar multiplication on Montgomery-form curves over pseudo-Mersenne prime fields, such as Curve25519, and can be used to implement static ECDH key exchange. SECCCM3 is scalable in the sense that it supports curves of different order (as long as certain conditions are met), thereby enabling trade-offs between security and execution time (resp. energy dissipation). We made an effort to protect the field arithmetic against Timing Attacks (TAs) and Simple Power Analysis (SPA), taking into account the so-called early-termination effect of the Cortex-M3 integer multiplier, which makes the latency of "long" multiply instructions operand-dependent. Our experiments show that the integration of countermeasures against information leakage caused by this effect increases the execution time by 34%, while the code size grows by 13%. A TA and SPA-resistant scalar multiplication on Curve25519 has an execution time of 4.565 million clock cycles and consumes approximately 5.1 mJ of energy when executed on a STM32L152RE Cortex-M3 microcontroller. SECCCM3 has a binary code size of 4.0 kB, which includes domain parameters for curves over 159, 191, 223, and 255-bit prime fields.
Disciplines :
Computer science
Author, co-author :
Franck, Christian ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Groszschädl, Johann ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Le Corre, Yann ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Lenou Tago, Cyrille ;  University of Luxembourg > Faculty of Science, Technology and Communication (FSTC)
External co-authors :
no
Language :
English
Title :
Energy-Scalable Montgomery-Curve ECDH Key Exchange for ARM Cortex-M3 Microcontrollers
Publication date :
August 2018
Event name :
5th IEEE International Workshop on Energy Management for Sustainable Internet-of-Things and Cloud Computing (EMSICC 2018)
Event place :
Barcelona, Spain
Event date :
from 06-08-2018 to 08-08-2018
Main work title :
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops (W-FICLOUD 2018)
Author, co-author :
Awan, Irfan
Younas, Muhammad
Portela, Filipe
Publisher :
IEEE Computer Society, Los Alamitos, United States - California
ISBN/EAN :
978-1-5386-7810-7
Pages :
231-236
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Available on ORBilu :
since 27 November 2018

Statistics


Number of views
145 (6 by Unilu)
Number of downloads
310 (14 by Unilu)

Scopus citations®
 
2
Scopus citations®
without self-citations
2

Bibliography


Similar publications



Contact ORBilu