Communication publiée dans un ouvrage (Colloques, congrès, conférences scientifiques et actes)
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism
GROSZSCHÄDL, Johann; LIU, Zhe; Hu, Zhi et al.
2019In Proceedings of the 8th International Workshop on Secure Internet of Things 2019 (SIoT 2019)
Peer reviewed
 

Documents


Texte intégral
SIOT2019.pdf
Postprint Auteur (206.54 kB)
Télécharger

Tous les documents dans ORBilu sont protégés par une licence d'utilisation.

Envoyer vers



Détails



Mots-clés :
IoT Security; Lightweight Cryptography; ECDH Key Exchange; Twisted Edwards Curve; Endomorphism
Résumé :
[en] It is widely accepted that public-key cryptosystems play a major role in the security arena of the Internet of Things (IoT), but they need to be implemented efficiently to not deplete the scarce resources of battery-operated devices such as wireless sensor nodes. This paper describes a highly-optimized software implementation of scalar multiplication for Elliptic Curve Diffie-Hellman (ECDH) key exchange on resource-limited IoT devices that achieves fast execution times along with reasonably small code size and RAM consumption. Our software uses a special class of elliptic curves, namely twisted Edwards curves with an efficiently computable endomorphism similar to that of the so- called Gallant-Lambert-Vanstone (GLV) curves. This allows us to combine the main advantage of the GLV model, which is an efficiently-computable endomorphism to speed up variable-base scalar multiplication, with the fast and complete addition rules of the (twisted) Edwards model. We implemented variable-base scalar multiplication for static ECDH on two such curves, one over a 159-bit and the second over a 207-bit pseudo-Mersenne prime field, respectively, and evaluated their execution time on a 16-bit MSP430F1611 processor. The arithmetic operations in the prime field do not contain operand-dependent conditional statements (in particular no "if-then-else" clauses) and also the scalar multiplication follows a fixed execution path for a given (static) scalar. A variable-base scalar multiplication on curves over the 159 and 207-bit field takes about 2.63 and 4.84 million clock cycles, respectively, on an MSP430F1611 processor. These results compare favorably with the Montgomery ladder on the equivalent Montgomery curves, which is almost 50% slower.
Centre de recherche :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA)
Disciplines :
Sciences informatiques
Auteur, co-auteur :
GROSZSCHÄDL, Johann ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
LIU, Zhe ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Computer Science and Communications Research Unit (CSC)
Hu, Zhi;  Central South University > School of Mathematics and Statistics
Su, Chunhua;  University of Aizu > Division of Computer Science
Zhou, Lu;  University of Aizu > Division of Computer Science
Co-auteurs externes :
yes
Langue du document :
Anglais
Titre :
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism
Date de publication/diffusion :
septembre 2019
Nom de la manifestation :
8th International Workshop on Secure Internet of Things 2019 (SIoT 2019)
Lieu de la manifestation :
Luxembourg, Luxembourg
Date de la manifestation :
26-09-2019
Manifestation à portée :
International
Titre de l'ouvrage principal :
Proceedings of the 8th International Workshop on Secure Internet of Things 2019 (SIoT 2019)
Maison d'édition :
IEEE
ISBN/EAN :
978-1-7281-4134-3
Pagination :
1-8
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Disponible sur ORBilu :
depuis le 24 janvier 2022

Statistiques


Nombre de vues
135 (dont 7 Unilu)
Nombre de téléchargements
1218 (dont 8 Unilu)

citations OpenAlex
 
0

Bibliographie


Publications similaires



Contacter ORBilu