Analysis of Efficient Implementation of Elliptic Curve Cryptography Architecture for Resource Constraint Application
نویسندگان
چکیده
Elliptic Curve Cryptography is gaining attraction in providing a high security level data transmission with low cost, small key size and smaller hardware realization. High-speed implementation significant factor ECC applications such as smart cards, network servers, wireless sensor based networks, Internet of Things Radio Frequency Identification. These require low-cost lightweight implementations. In the resource constrain application, cryptography has emerged desired one because limited energy devices scarce computational resources. Design options wide range parameters affect overall system. Implementation target device, coordinate system, underlying finite fields modular arithmetic algorithms are design that impact outcome. A statistical study conducted on large collection published work parameters. The basic question arises how to select appropriate flexibility-efficiency tradeoff. subjects generator, versatile, reconfigurable, dedicated general purpose scalar multipliers addressed. review various perform multiplication prime binary been done more effectively. results different FPGA platform compared analyzed performance Besides, classification previous works terms flexibility, performance, scalability cost effectiveness presented.
منابع مشابه
Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks
One of the huge problems for security in sensor networks is the lack of resources. Typical sensor nodes such as the quite popular MICA and MICA2 Motes from UC Berkeley [1] are based on a microcontroller architecture with only a few KBytes of memory and severe limited computing ability. Strong publickey cryptography is therefore commonly seen as infeasible on such devices. In contrast to this pr...
متن کاملEfficient implementation of elliptic curve cryptography on FPGAs
I would also like to thank Courtney Tenz and Jeff Godden for their proofreadings.
متن کاملEfficient implementation of elliptic curve cryptography in wireless sensors
The deployment of cryptography in sensor networks is a challenging task, given the limited computational power and the resource-constrained nature of the sensoring devices. This paper presents the implementation of elliptic curve cryptography in the MICAz Mote, a popular sensor platform. We present optimization techniques for arithmetic in binary fields, including squaring, multiplication and m...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملEfficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices
The Micro Edition of the Java 2 platform (J2ME) provides an application environment specifically designed to address the demands of embedded devices like cell phones, PDAs or set-top boxes. Since the J2ME platform does not include a crypto package, developers are forced to use third-party classes or to implement all cryptographic primitives from scratch. However, most existing implementations o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of innovative technology and exploring engineering
سال: 2021
ISSN: ['2278-3075']
DOI: https://doi.org/10.35940/ijitee.f8701.10101221