A Survey on Hardware Implementations of Elliptic Curve Cryptosystems

10/19/2017
by   Bahram Rashidi, et al.
0

In the past two decades, Elliptic Curve Cryptography (ECC) have become increasingly advanced. ECC, with much smaller key sizes, offers equivalent security when compared to other asymmetric cryptosystems. In this survey, an comprehensive overview of hardware implementations of ECC is provided. We first discuss different elliptic curves, point multiplication algorithms and underling finite field operations over binary fields F2m and prime fields Fp which are used in the literature for hardware implementation. Then methods, steps and considerations of ECC implementation are presented. The implementations of the ECC are categorized in two main groups based on implementation technologies consist of field programmable gate array (FPGA) based implementations and application specific integrated circuit (ASIC) implementations. Therefore, in these categories to have a better presentation and comparison, the implementations are presented and distinguished based on type of finite fields. The best and newest structures in the literature are described in more details for overall presentation of architectures and approaches in each group of implementations. High-speed implementation is an important factor in the ECC applications such as network servers. Also in smart cards, Wireless Sensor Networks (WSN) and Radio Frequency Identification (RFID) tags require to low-cost and lightweight implementations. Therefore, implementation methods related to these applications are explored. In addition, a classification of the previous works in terms of scalability, flexibility, performance and cost effectiveness is provided. Finally, some words and techniques about future works that should be considered are provided.

READ FULL TEXT

page 3

page 18

page 28

page 30

page 33

research
04/13/2023

A Comprehensive Survey on the Implementations, Attacks, and Countermeasures of the Current NIST Lightweight Cryptography Standard

This survey is the first work on the current standard for lightweight cr...
research
02/15/2020

High-speed KATAN Ciphers on-a-Chip

Security in embedded systems has become a main requirement in modern ele...
research
05/16/2019

Speeding Up Elliptic Curve Multiplication with Mixed-base Representation for Applications to SIDH Ciphers

Elliptic curve multiplications can be improved by replacing the standard...
research
09/17/2018

Algorithmic Obfuscation over GF(2^m)

Galois Field arithmetic blocks are the key components in many security a...
research
06/23/2021

EC Scalar Multiplication: Successful Simple Address Bit SCA Attack against Atomic Patterns

In this work we discuss the resistance of atomic pattern algorithms for ...
research
03/30/2019

An Analysis Framework for Hardware and Software Implementations with Applications from Cryptography

With the richness of present-day hardware architectures, tightening the ...

Please sign up or login with your details

Forgot password? Click here to reset