Efficient implementation of elliptic curve cryptography in wireless sensors

@article{Aranha2010EfficientIO,
  title={Efficient implementation of elliptic curve cryptography in wireless sensors},
  author={Diego F. Aranha and Ricardo Dahab and Julio L{\'o}pez Hernandez and Leonardo B. Oliveira},
  journal={Adv. Math. Commun.},
  year={2010},
  volume={4},
  pages={169-187}
}
The deployment of cryptography in sensor networks is a challenging task, given the limited computational power and the resource-constrained nature of the sensoring devices. This paper presents the implementation of elliptic curve cryptography in the MICAz Mote, a popular sensor platform. We present optimization techniques for arithmetic in binary fields, including squaring, multiplication and modular reduction at two different security levels. Our implementation of field multiplication and… 
Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller
TLDR
A software implementation of elliptic curve cryptography and pairing-based cryptography for the MSP430 microcontroller family, which is used in wireless sensors, and shows that even the 128-bit level of security can be considered feasible for this platform.
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes
TLDR
This paper presents a highly-optimized implementation of standards-compliant Elliptic Curve Cryptography (ECC) for wireless sensor nodes and similar devices featuring an 8-bit AVR processor and introduces a novel lazy doubling method for multi-precision squaring which provides better performance than any of the previously-proposed squaring techniques.
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes
TLDR
A highly optimized software implementation of standards-compliant elliptic curve cryptography (ECC) for wireless sensor nodes equipped with an 8-bit AVR microcontroller and its implementation of scalar multiplication has a highly regular execution profile, which helps to protect against certain side-channel attacks.
Elliptic curve cryptography algorithms resistant against power analysis attacks on resource constrained devices
TLDR
This thesis proposes two robust and high efficient PAA aware elliptic curve cryptoprocessors architectures based on innovative algorithms for ECC core operation and two additional architectures that are envisioned at securing the elliptic Curve cryptop rocessors against Differential Power Analysis (DPA) attacks.
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks
TLDR
This paper introduces MoTE-ECC, a highly optimized yet scalable ECC library for Memsic’s MICAz motes and other sensor nodes equipped with an 8-bit AVR processor, and describes the efforts to harden MoTEs against side-channel attacks and introduces a highly regular implementation of the comb method.
A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP
TLDR
This research introduces the instruction set architecture (ISA) extension method to accelerate this algorithm (192-bit private key) and builds an ECC_ASIP model with six new ECC custom instructions, which is implemented in a field-programmable gate array (FPGA) platform.
Hardware implementations of Elliptic Curve Cryptography in Wireless Sensor Networks
TLDR
The study shows that most of the reviewed implementations of Elliptic Curve Cryptography were implemented on Application Specific Integrated Circuits (ASIC) and only one was implemented on Field Programmable Gate Array (FPGA).
Highly Efficient Implementation of NIST-Compliant Koblitz Curve for 8-bit AVR-Based Sensor Nodes
This paper presents an efficient implementation of elliptic curve cryptography (ECC) over the National Institute of Standards and Technology (NIST) K-233 curve for 8-bit AVR microcontrollers commonly
Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT
TLDR
A new set of Binary Edwards Curves which have been designed to achieve the highest security levels (up to 284-bit security level) and whose parameters have been defined to IoT devices embedding 32-bit general purpose processors.
Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device
TLDR
This work proposes an efficient, secure, and compact implementation of scalar multiplication on a 256-bit elliptic curve recommended by the SM2, as well as a comparison implementation on the same bit-length elliptic Curve recommended by NIST.
...
...

References

SHOWING 1-10 OF 52 REFERENCES
TinySA: a security architecture for wireless sensor networks
TLDR
The design and rationale of TinySA, a lightweight security architecture for wireless sensor networks and so-called "smart dust" running the TinyOS operating system, are presented, which shows that strong elliptic curve cryptography is feasible on sensor nodes.
Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes
TLDR
This article presents the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro controller which are typically used in WSNs and presents an optimized arithmetic algorithm which significantly speed up ECC schemes.
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
TLDR
This paper presents results on implementing ECC, as well as the related emerging field of Pairing-Based Cryptography (PBC), on two of the most popular sensor nodes, and shows that PKC is not only viable, but in fact attractive for WSNs.
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
  • D. Malan, M. Welsh, Michaela Smith
  • Computer Science, Mathematics
    2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004.
  • 2004
TLDR
It is demonstrated that public keys can be generated within 34 seconds, and that shared secrets can be distributed among nodes in a sensor network within the same, using just over 1 kilobyte of SRAM and 34 kilobytes of ROM.
Studying Software Implementations of Elliptic Curve Cryptography
  • Hai Yan, Z. Shi
  • Computer Science
    Third International Conference on Information Technology: New Generations (ITNG'06)
  • 2006
TLDR
This paper studies the software implementations of ECC on processors with different word sizes and identifies a set of algorithms that can perform 163-bit ECC in 13.9 seconds on an 8-bit processor at a clock rate of 8 MHz.
Architectural Extensions for Elliptic Curve Cryptography over GF ( 2 m )
TLDR
It is shown that simple extensions of the data path suffice to efficiently support ECC over GF (2m) and to outperform ECCOver GF (p) and a multiplyaccumulate instruction for efficient multiple-precision multiplications is provided.
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
TLDR
TinyECCK (Tiny Elliptic Curve Cryptosystem with Koblitz curve – a kind of TinyOS package supporting elliptic curve operations) is presented, which is the first implementation of Koblitzer curve on sensor motes as far as the authors know and comparisons with existing software implementations of ECC outperforms them in terms of running time, code size and supporting services.
Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography
TLDR
This paper investigates all categories of finite fields suitable for elliptic curve cryptography on the ATmega128 microcontroller: Fp, F2d , and Fpd and it turns out that binary fields enable the most efficient implementations.
Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper)
TLDR
The implementation of the RSA and ECC public-key cryptosystem on Berkeley Motes achieves the performance of 0.79s for RSA public key operation and 21.5s for private operation, and 1.3s for ECC signature generation and 2.8s for verification.
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
...
...