Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier

Leandro Marin , Antonio Jara , Antonio Skarmeta Gomez
{"title":"Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier","authors":"Leandro Marin ,&nbsp;Antonio Jara ,&nbsp;Antonio Skarmeta Gomez","doi":"10.1016/j.mcm.2013.02.008","DOIUrl":null,"url":null,"abstract":"<div><p>Security for the Internet of Things (IoT) presents the challenge of offering suitable security primitives to enable IP-based security protocols such as IPSec and DTLS. This challenge is here because host-based implementations and solutions are not providing a proper performance over the devices used in the IoT. This is mainly because of the use of highly constraint devices in terms of computational capabilities. Therefore, it is necessary to implement new optimized and scalable cryptographic primitives which can use existing protocols to provide security, authentication, privacy and integrity to the communications. Our research focus on the mathematical optimization of cryptographic primitives for Public Key Cryptography (PKC) based on Elliptic Curve Cryptography (ECC). PKC has been considered, since the IoT requires high scalability, multi-domain interoperability, self-commissioning, and self-identification.</p><p>Specifically, this contribution presents a set of optimizations for ECC over constrained devices, and a brief tutorial of its implementation in the microprocessor Texas Instrument MSP430 (Briel, 2000)  <span>[1]</span> (commonly used in IoT devices such as 6LoWPAN, active RFID and DASH7). Our main contribution is the proof that these special pseudo-Mersenne primes, which we have denominated ‘shifting primes’ can be used for ECC primitives with 160-bit keys in a highly optimal way. This paper presents an ECC scalar multiplication with 160-bit keys within 5.4 million clock cycles over MSP430 devices without hardware multiplier. Shifting primes provide a set of features, which make them more compliant with the set of instructions available with tiny CPUs such as the MSP430 and other 8 and 16-bit CPUs.</p></div>","PeriodicalId":49872,"journal":{"name":"Mathematical and Computer Modelling","volume":"58 5","pages":"Pages 1155-1174"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.mcm.2013.02.008","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mathematical and Computer Modelling","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0895717713000563","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

Abstract

Security for the Internet of Things (IoT) presents the challenge of offering suitable security primitives to enable IP-based security protocols such as IPSec and DTLS. This challenge is here because host-based implementations and solutions are not providing a proper performance over the devices used in the IoT. This is mainly because of the use of highly constraint devices in terms of computational capabilities. Therefore, it is necessary to implement new optimized and scalable cryptographic primitives which can use existing protocols to provide security, authentication, privacy and integrity to the communications. Our research focus on the mathematical optimization of cryptographic primitives for Public Key Cryptography (PKC) based on Elliptic Curve Cryptography (ECC). PKC has been considered, since the IoT requires high scalability, multi-domain interoperability, self-commissioning, and self-identification.

Specifically, this contribution presents a set of optimizations for ECC over constrained devices, and a brief tutorial of its implementation in the microprocessor Texas Instrument MSP430 (Briel, 2000)  [1] (commonly used in IoT devices such as 6LoWPAN, active RFID and DASH7). Our main contribution is the proof that these special pseudo-Mersenne primes, which we have denominated ‘shifting primes’ can be used for ECC primitives with 160-bit keys in a highly optimal way. This paper presents an ECC scalar multiplication with 160-bit keys within 5.4 million clock cycles over MSP430 devices without hardware multiplier. Shifting primes provide a set of features, which make them more compliant with the set of instructions available with tiny CPUs such as the MSP430 and other 8 and 16-bit CPUs.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
移位素数:优化椭圆曲线加密的16位设备没有硬件乘法器
物联网(IoT)的安全性提出了提供合适的安全原语以启用基于ip的安全协议(如IPSec和DTLS)的挑战。这是一个挑战,因为基于主机的实现和解决方案不能为物联网中使用的设备提供适当的性能。这主要是因为在计算能力方面使用了高度约束的设备。因此,有必要实现新的优化和可扩展的加密原语,这些原语可以使用现有的协议来提供通信的安全性、身份验证、隐私性和完整性。我们的研究重点是基于椭圆曲线加密(ECC)的公钥加密(PKC)中密码原语的数学优化。由于物联网需要高可扩展性、多域互操作性、自调试和自识别,PKC已经被考虑在内。具体来说,本文提出了一组针对ECC受限设备的优化,并简要介绍了其在微处理器德州仪器MSP430 (Briel, 2000)[1](通常用于物联网设备,如6LoWPAN,有源RFID和DASH7)中的实现。我们的主要贡献是证明了这些特殊的伪梅森素数,我们称之为“移位素数”,可以以一种高度优化的方式用于具有160位密钥的ECC原语。本文提出了一种在没有硬件乘法器的MSP430器件上,在540万时钟周期内实现160位密钥的ECC标量乘法。移位质数提供了一组特性,使它们更符合微型cpu(如MSP430和其他8位和16位cpu)的指令集。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Mathematical and Computer Modelling
Mathematical and Computer Modelling 数学-计算机:跨学科应用
自引率
0.00%
发文量
0
审稿时长
9.5 months
期刊最新文献
Review of Current Policy Strategies to Reduce US Cancer Drug Costs. Editorial Board WITHDRAWN: Risk analysis and damage assessment of financial institutions in cyber attacks between nations Airline network design and adjustment in response to fluctuation in jet fuel prices Valedictory Editorial
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1