Abstract

In this paper, we present a highly optimized implementation of elliptic curve cryptography (ECC) over NIST P-256 curve for an 8-bit AVR microcontroller. For improving the performance of ECC implementation, we focus on optimizing field arithmetics. In particular, we optimize the modular multiplication and squaring method exploiting the state-of-the-art optimization technique, namely range shifted representation (RSR). With optimized field arithmetics, we significantly improve the performance of scalar multiplication and set the speed record for execution time of variable base scalar multiplication over NIST P-256 curve. When compared with previous works, we achieve a performance gain of 17.3% over the best previous result on the same platform. Moreover, the execution time of our result is even faster than that over the NIST P-192 curve of the well-known TinyECC library. Our result shows that RSR can be applied to all field arithmetics and evaluate the impact of the adoption of RSR over the performance of scalar multiplication. Additionally, our implementation provides a high degree of regularity to withstand side-channel attacks.

Highlights

  • Wireless sensor networks (WSNs) that consist of a numerous number of resource-constrained sensor devices have attracted substantial attraction due to the rapid advancement of Internet of Things (IoT)

  • We focus on applying all field operations on range shifted representation (RSR) in order to improve the performance of scalar multiplication

  • We introduce the fast elliptic curve cryptography (ECC) implementation over NIST P-256 curve on an 8-bit AVR

Read more

Summary

Introduction

Wireless sensor networks (WSNs) that consist of a numerous number of resource-constrained sensor devices have attracted substantial attraction due to the rapid advancement of Internet of Things (IoT). When compared with traditional cable networks, it is difficult to ensure secure and reliable communications in WSNs, since those wireless sensor nodes are often deployed in unattended environments. It can be accessed and manipulated by malicious adversaries. The cryptographic mechanism is required in order to provide sufficient security in WSNs. it is hard to deploy cryptographic schemes (especially of public key cryptography) on wireless sensor nodes due to their construction in resources, such as computation power, memory, energy, and even storage space, since they usually assumed to be operated with battery-power. Many researches have naturally focused on optimizing the multiplication technique in order to improve the performance of scalar multiplication

Related Work
Our Contributions
Elliptic Curve Cryptography
Range Shifted Representation
Modular Multiplication on RSR
Modular Multiplication
10: Reduction part 1
13: Propagate carry5 to HB
Modular Squaring
Modular Addition
Modular Inversion
Conversion of Representation
1: Define 256-bit integers
Coordinate System for Point Arithmetic
Co-Z Arithmetic
Montgomery Ladder for Regular Scalar Multiplication
Performance Analysis and Comparison
Findings
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.