Analysis of Efficient Implementation of Elliptic Curve Cryptography Architecture for Resource Constraint Application

نویسندگان

چکیده

Elliptic Curve Cryptography is gaining attraction in providing a high security level data transmission with low cost, small key size and smaller hardware realization. High-speed implementation significant factor ECC applications such as smart cards, network servers, wireless sensor based networks, Internet of Things Radio Frequency Identification. These require low-cost lightweight implementations. In the resource constrain application, cryptography has emerged desired one because limited energy devices scarce computational resources. Design options wide range parameters affect overall system. Implementation target device, coordinate system, underlying finite fields modular arithmetic algorithms are design that impact outcome. A statistical study conducted on large collection published work parameters. The basic question arises how to select appropriate flexibility-efficiency tradeoff. subjects generator, versatile, reconfigurable, dedicated general purpose scalar multipliers addressed. review various perform multiplication prime binary been done more effectively. results different FPGA platform compared analyzed performance Besides, classification previous works terms flexibility, performance, scalability cost effectiveness presented.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks

One of the huge problems for security in sensor networks is the lack of resources. Typical sensor nodes such as the quite popular MICA and MICA2 Motes from UC Berkeley [1] are based on a microcontroller architecture with only a few KBytes of memory and severe limited computing ability. Strong publickey cryptography is therefore commonly seen as infeasible on such devices. In contrast to this pr...

متن کامل

Efficient implementation of elliptic curve cryptography on FPGAs

I would also like to thank Courtney Tenz and Jeff Godden for their proofreadings.

متن کامل

Efficient implementation of elliptic curve cryptography in wireless sensors

The deployment of cryptography in sensor networks is a challenging task, given the limited computational power and the resource-constrained nature of the sensoring devices. This paper presents the implementation of elliptic curve cryptography in the MICAz Mote, a popular sensor platform. We present optimization techniques for arithmetic in binary fields, including squaring, multiplication and m...

متن کامل

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

The Micro Edition of the Java 2 platform (J2ME) provides an application environment specifically designed to address the demands of embedded devices like cell phones, PDAs or set-top boxes. Since the J2ME platform does not include a crypto package, developers are forced to use third-party classes or to implement all cryptographic primitives from scratch. However, most existing implementations o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of innovative technology and exploring engineering

سال: 2021

ISSN: ['2278-3075']

DOI: https://doi.org/10.35940/ijitee.f8701.10101221