scispace - formally typeset
Journal ArticleDOI

A state-of-the-art elliptic curve cryptographic processor operating in the frequency domain

Reads0
Chats0
TLDR
The work at hand presents the firstHardware implementation of a frequency domain multiplier suitable for ECC and the first hardware implementation of ECC in the frequency domain.
Abstract
We propose a novel area/time efficient elliptic curve cryptography (ECC) processor architecture which performs all finite field arithmetic operations in the discrete Fourier domain. The proposed architecture utilizes a class of optimal extension fields (OEF) GF(qm) where the field characteristic is a Mersenne prime q = 2n - 1 and m = n. The main advantage of our architecture is that it achieves extension field modular multiplication in the discrete Fourier domain with only a linear number of base field GF(q) multiplications in addition to a quadratic number of simpler operations such as addition and bitwise rotation. We achieve an area between 25k and 50k equivalent gates for the implementations over OEFs of size 169, 289 and 361 bits. With its low area and high speed, the proposed architecture is well suited for ECC in small device environments such as sensor networks. The work at hand presents the first hardware implementation of a frequency domain multiplier suitable for ECC and the first hardware implementation of ECC in the frequency domain.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Secure vehicular communication systems: implementation, performance, and research challenges

TL;DR: The design of a VC security system that has emerged as a result of the European SeVe-Com project is discussed and an outlook on open security research issues that will arise as VC systems develop from today's simple prototypes to full-fledged systems is provided.
Book ChapterDOI

Towards efficient arithmetic for lattice-based cryptography on reconfigurable hardware

TL;DR: This work makes a first step towards efficient FFT-based arithmetic for lattice-based cryptography and shows that the FFT can be implemented efficiently on reconfigurable hardware.
Journal ArticleDOI

Complexity of computation in finite fields

TL;DR: This work gives a review of some works on the complexity of implementation of arithmetic operations in finite fields by Boolean circuits.
Journal ArticleDOI

Elliptic Curve Cryptography for Wireless Sensor Networks Using the Number Theoretic Transform.

TL;DR: This work implements elliptic curve cryptography on the MSP430 which is a commonly used microcontroller in wireless sensor network nodes and takes advantage of the fast Fourier transform for the first time in the literature to speed up the number theoretic transform for an efficient realization of elliptic Curve cryptography.

Frequency Domain Finite Field Arithmetic for Elliptic Curve Cryptography

Selcuk Baktir
TL;DR: It is shown that, especially in computationally constrained platforms, multiplication of finite field elements may be achieved more efficiently in the frequency domain than in the time domain for operand sizes relevant to elliptic curve cryptography (ECC).
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Elliptic curve cryptosystems

TL;DR: The question of primitive points on an elliptic curve modulo p is discussed, and a theorem on nonsmoothness of the order of the cyclic subgroup generated by a global point is given.
Book ChapterDOI

Use of Elliptic Curves in Cryptography

TL;DR: In this paper, an analogue of the Diffie-Hellmann key exchange protocol was proposed, which appears to be immune from attacks of the style of Western, Miller, and Adleman.
Book

Elliptic Curves in Cryptography

TL;DR: In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems as mentioned in this paper, and it has become all pervasive.