Paper published in a book (Scientific congresses, symposiums and conference proceedings)
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism
Groszschädl, Johann; Liu, Zhe; Hu, Zhi et al.
2019In Proceedings of the 8th International Workshop on Secure Internet of Things 2019 (SIoT 2019)
Peer reviewed
 

Files


Full Text
SIOT2019.pdf
Author postprint (206.54 kB)
Download

All documents in ORBilu are protected by a user license.

Send to



Details



Keywords :
IoT Security; Lightweight Cryptography; ECDH Key Exchange; Twisted Edwards Curve; Endomorphism
Abstract :
[en] It is widely accepted that public-key cryptosystems play a major role in the security arena of the Internet of Things (IoT), but they need to be implemented efficiently to not deplete the scarce resources of battery-operated devices such as wireless sensor nodes. This paper describes a highly-optimized software implementation of scalar multiplication for Elliptic Curve Diffie-Hellman (ECDH) key exchange on resource-limited IoT devices that achieves fast execution times along with reasonably small code size and RAM consumption. Our software uses a special class of elliptic curves, namely twisted Edwards curves with an efficiently computable endomorphism similar to that of the so- called Gallant-Lambert-Vanstone (GLV) curves. This allows us to combine the main advantage of the GLV model, which is an efficiently-computable endomorphism to speed up variable-base scalar multiplication, with the fast and complete addition rules of the (twisted) Edwards model. We implemented variable-base scalar multiplication for static ECDH on two such curves, one over a 159-bit and the second over a 207-bit pseudo-Mersenne prime field, respectively, and evaluated their execution time on a 16-bit MSP430F1611 processor. The arithmetic operations in the prime field do not contain operand-dependent conditional statements (in particular no "if-then-else" clauses) and also the scalar multiplication follows a fixed execution path for a given (static) scalar. A variable-base scalar multiplication on curves over the 159 and 207-bit field takes about 2.63 and 4.84 million clock cycles, respectively, on an MSP430F1611 processor. These results compare favorably with the Montgomery ladder on the equivalent Montgomery curves, which is almost 50% slower.
Research center :
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA)
Disciplines :
Computer science
Author, co-author :
Groszschädl, Johann ;  University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)
Liu, Zhe ;  University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Computer Science and Communications Research Unit (CSC)
Hu, Zhi;  Central South University > School of Mathematics and Statistics
Su, Chunhua;  University of Aizu > Division of Computer Science
Zhou, Lu;  University of Aizu > Division of Computer Science
External co-authors :
yes
Language :
English
Title :
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism
Publication date :
September 2019
Event name :
8th International Workshop on Secure Internet of Things 2019 (SIoT 2019)
Event place :
Luxembourg, Luxembourg
Event date :
26-09-2019
Audience :
International
Main work title :
Proceedings of the 8th International Workshop on Secure Internet of Things 2019 (SIoT 2019)
Publisher :
IEEE
ISBN/EAN :
978-1-7281-4134-3
Pages :
1-8
Peer reviewed :
Peer reviewed
Focus Area :
Security, Reliability and Trust
Available on ORBilu :
since 24 January 2022

Statistics


Number of views
84 (6 by Unilu)
Number of downloads
178 (8 by Unilu)

Bibliography


Similar publications



Contact ORBilu