Full-Size High-Security ECC Implementation on MSP430 Microcontrollers
نویسندگان
چکیده
In the era of the Internet of Things, smart electronic devices facilitate processes in our everyday lives. Texas Instrument's MSP430 microcontrollers target low-power applications, among which are wireless sensor, metering and medical applications. Those domains have in common that sensitive data is processed, which calls for strong security primitives to be implemented on those devices. Curve25519, which builds on a 255-bit prime eld, has been proposed as an e cient, highly-secure elliptic-curve. While its high performance on powerful processors has been shown, the question remains, whether it is suitable for use in embedded devices. In this paper we present an implementation of Curve25519 for MSP430 microcontrollers. To combat timing attacks, we completely avoid conditional jumps and loads, thus making our software constant time. We give a comprehensive evaluation of di erent implementations of the modular multiplication and show which ones are favorable for di erent conditions. We further present implementation results of Curve25519, where our best implementation requires 9.1 million or 6.5 million cycles on MSP430Xs having a 16× 16-bit or a 32× 32-bit hardware multiplier respectively.
منابع مشابه
Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes
The Internet is rapidly evolving from a network of personal computers and servers to a network of smart objects (“things”) able to communicate with each other and with central resources. This evolution has created a demand for lightweight implementations of cryptographic algorithms suitable for resource-constrained devices such as RFID tags and wireless sensor nodes. In this paper we describe a...
متن کاملShifting Primes: Extension of Pseudo-Mersenne Primes to Optimize ECC for MSP430-Based Future Internet of Things Devices
Security support for small and smart devices is one of the most important issues in the Future Internet of things, since technologies such as 6LoWPAN are opening the access to the real world through Internet. 6LoWPAN devices are highly constrained in terms of computational capabilities, memory, communication bandwidth, and battery power. Therefore, in order to support security, it is necessary ...
متن کاملHigh-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
This paper presents new speed records for 128-bit secure elliptic-curve Diffie-Hellman key-exchange software on three different popular microcontroller architectures. We consider a 255-bit curve proposed by Bernstein known as Curve25519, which has also been adopted by the IETF. We optimize the X25519 key-exchange protocol proposed by Bernstein in 2006 for AVR ATmega 8-bit microcontrollers, MSP4...
متن کاملEnergy-Architecture Tuning for ECC-Based RFID Tags
The implementation of Elliptic Curve Cryptography (ECC) on small microcontrollers is challenging. Past research has therefore emphasized performance optimization: pick a target architecture, and minimize the cycle count and footprint of the ECC software. This paper addresses a different aspect of resource-constrained ECC implementation: given the application profile, identify the most suitable ...
متن کاملAlgebraic Eraser
The Algebraic Eraser (AE) provides a public-key Diffie-Hellman style key agreement protocol that performs significantly better than ECC in both software and hardware. One hardware implementation in 65nm CMOS performs 70-200 times better than ECC in speed and power usage. Software implementations also perform 50-200 times faster than ECC (for example on an MSP430 using around 5000 bytes of code ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014