# Efficient implementation of elliptic curve cryptography in wireless sensors

@article{Aranha2010EfficientIO, title={Efficient implementation of elliptic curve cryptography in wireless sensors}, author={Diego F. Aranha and Ricardo Dahab and Julio L{\'o}pez Hernandez and Leonardo B. Oliveira}, journal={Adv. Math. Commun.}, year={2010}, volume={4}, pages={169-187} }

The deployment of cryptography in sensor networks is a challenging task, given the limited computational power and the resource-constrained
nature of the sensoring devices. This paper presents the implementation of
elliptic curve cryptography in the MICAz Mote, a popular sensor platform.
We present optimization techniques for arithmetic in binary fields, including
squaring, multiplication and modular reduction at two different security levels.
Our implementation of field multiplication and…

## Figures and Tables from this paper

## 58 Citations

Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller

- Computer Science, MathematicsJournal of Cryptographic Engineering
- 2012

A software implementation of elliptic curve cryptography and pairing-based cryptography for the MSP430 microcontroller family, which is used in wireless sensors, and shows that even the 128-bit level of security can be considered feasible for this platform.

Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes

- Computer Science, MathematicsICICS
- 2013

This paper presents a highly-optimized implementation of standards-compliant Elliptic Curve Cryptography (ECC) for wireless sensor nodes and similar devices featuring an 8-bit AVR processor and introduces a novel lazy doubling method for multi-precision squaring which provides better performance than any of the previously-proposed squaring techniques.

Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes

- Computer Science, MathematicsIEEE Transactions on Information Forensics and Security
- 2016

A highly optimized software implementation of standards-compliant elliptic curve cryptography (ECC) for wireless sensor nodes equipped with an 8-bit AVR microcontroller and its implementation of scalar multiplication has a highly regular execution profile, which helps to protect against certain side-channel attacks.

Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices

- Computer Science
- 2012

This thesis proposes two robust and high efficient PAA aware elliptic curve cryptoprocessors architectures based on innovative algorithms for ECC core operation and two additional architectures that are envisioned at securing the elliptic Curve cryptop rocessors against Differential Power Analysis (DPA) attacks.

MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks

- Computer Science, MathematicsACNS
- 2014

This paper introduces MoTE-ECC, a highly optimized yet scalable ECC library for Memsic’s MICAz motes and other sensor nodes equipped with an 8-bit AVR processor, and describes the efforts to harden MoTEs against side-channel attacks and introduces a highly regular implementation of the comb method.

A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP

- Computer Science, Mathematics2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC)
- 2016

This research introduces the instruction set architecture (ISA) extension method to accelerate this algorithm (192-bit private key) and builds an ECC_ASIP model with six new ECC custom instructions, which is implemented in a field-programmable gate array (FPGA) platform.

Hardware implementations of Elliptic Curve Cryptography in Wireless Sensor Networks

- Computer Science, Mathematics2011 International Conference for Internet Technology and Secured Transactions
- 2011

The study shows that most of the reviewed implementations of Elliptic Curve Cryptography were implemented on Application Specific Integrated Circuits (ASIC) and only one was implemented on Field Programmable Gate Array (FPGA).

Highly Efficient Implementation of NIST-Compliant Koblitz Curve for 8-bit AVR-Based Sensor Nodes

- Computer ScienceIEEE Access
- 2018

This paper presents an efficient implementation of elliptic curve cryptography (ECC) over the National Institute of Standards and Technology (NIST) K-233 curve for 8-bit AVR microcontrollers commonly…

Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT

- Computer Science, MathematicsICETE
- 2018

A new set of Binary Edwards Curves which have been designed to achieve the highest security levels (up to 284-bit security level) and whose parameters have been deﬁned to IoT devices embedding 32-bit general purpose processors.

Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device

- Computer Science, MathematicsACM Trans. Embed. Comput. Syst.
- 2019

This work proposes an efficient, secure, and compact implementation of scalar multiplication on a 256-bit elliptic curve recommended by the SM2, as well as a comparison implementation on the same bit-length elliptic Curve recommended by NIST.

## References

SHOWING 1-10 OF 52 REFERENCES

TinySA: a security architecture for wireless sensor networks

- Computer Science, MathematicsCoNEXT '06
- 2006

The design and rationale of TinySA, a lightweight security architecture for wireless sensor networks and so-called "smart dust" running the TinyOS operating system, are presented, which shows that strong elliptic curve cryptography is feasible on sensor nodes.

Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes

- Computer Science, MathematicsESAS
- 2007

This article presents the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro controller which are typically used in WSNs and presents an optimized arithmetic algorithm which significantly speed up ECC schemes.

NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks

- Computer Science, MathematicsEWSN
- 2008

This paper presents results on implementing ECC, as well as the related emerging field of Pairing-Based Cryptography (PBC), on two of the most popular sensor nodes, and shows that PKC is not only viable, but in fact attractive for WSNs.

A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography

- Computer Science, Mathematics2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004.
- 2004

It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.

Studying Software Implementations of Elliptic Curve Cryptography

- Computer ScienceThird International Conference on Information Technology: New Generations (ITNG'06)
- 2006

This paper studies the software implementations of ECC on processors with different word sizes and identifies a set of algorithms that can perform 163-bit ECC in 13.9 seconds on an 8-bit processor at a clock rate of 8 MHz.

Architectural Extensions for Elliptic Curve Cryptography over GF ( 2 m )

- Computer Science, Mathematics
- 2005

It is shown that simple extensions of the data path suffice to efficiently support ECC over GF (2m) and to outperform ECCOver GF (p) and a multiplyaccumulate instruction for efficient multiple-precision multiplications is provided.

TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote

- Computer ScienceIEICE Trans. Inf. Syst.
- 2008

TinyECCK (Tiny Elliptic Curve Cryptosystem with Koblitz curve – a kind of TinyOS package supporting elliptic curve operations) is presented, which is the first implementation of Koblitzer curve on sensor motes as far as the authors know and comparisons with existing software implementations of ECC outperforms them in terms of running time, code size and supporting services.

Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2008

This paper investigates all categories of finite fields suitable for elliptic curve cryptography on the ATmega128 microcontroller: Fp, F2d , and Fpd and it turns out that binary fields enable the most efficient implementations.

Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)

- Computer Science, MathematicsICICS
- 2006

The implementation of the RSA and ECC public-key cryptosystem on Berkeley Motes achieves the performance of 0.79s for RSA public key operation and 21.5s for private operation, and 1.3s for ECC signature generation and 2.8s for verification.

TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks

- Computer Science2008 5th International Conference on Networked Sensing Systems
- 2008