Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor

High-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IEE Proceedings - Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The results of the implementation of elliptic curve cryptography (ECC) over the field GF(p) on an 80 MHz, 32-bit ARM microprocessor are presented. A practical software library has been produced which supports variable length implementation of the elliptic curve digital signature algorithm (ECDSA). The ECDSA and a recently proposed ECC-based wireless authentication protocol are implemented using the library. Timing results show that the 160-bit ECDSA signature generation and verification operations take around 46 ms and 94 ms, respectively. With these timings, the execution of the ECC-based wireless authentication protocol takes around 140 ms on the ARM7TDMI processor, which is a widely used, low-power core processor for wireless applications.

References

    1. 1)
      • Koç, Ç.K.: `High-speed RSA implementation', TR 201, Technical Report, 1994.
    2. 2)
      • T. Hasegawa , J. Nakajima , M. Matsui , H. Imai , Y. Zheng . (1998) A practical implementation of elliptic curve cryptosystems over , First international workshop on Practice and theory in public key cryptography.
    3. 3)
      • `P1363: Standard specifications for public-key cryptography', Draft Version 13, 1999.
    4. 4)
      • Aydos, M., Sunar, B., Koç, Ç.K.: `An elliptic curve cryptography based authentication and key agreementprotocol for wireless communication', Proceedings of 2nd International workshop on Discrete algorithms and methods for mobile computing and Communications symposium on Information theory, 1998, Dallas, Texas.
    5. 5)
      • ARM Incorporated . (1998) Advanced RISC machines architectural reference manual.
    6. 6)
      • Gunasekara, O.: Developing a digital cellular phone usinga 32-bit microcontroller. 1998,http://www.arm.com/Documentation/WhitePapers/CellPhone.
    7. 7)
      • D. Jaggar . ARM architecture and systems. IEEE Micro , 9 - 11
    8. 8)
      • S. Segars . ARM7TDMI power consumption. IEEE Micro , 12 - 19
    9. 9)
      • Gunasekara, O.: Smart phone challenges. 1997, http://www.arm.com/Documentation/WhitePapers/SmartPhone.
    10. 10)
      • P. Montgomery . Modular multiplication without trial division. Math. Comput. , 170 , 519 - 521
    11. 11)
      • Lenstra, A.K., Verheul, E.R.: `Selecting cryptographic key sizes', Proceedings of 3rd Workshop on Elliptic curve cryptography(ECC 99), 1999, Waterloo, Canada, p. 1–3.
    12. 12)
      • I. Blake , G. Seroussi , N. Smart . (1999) Elliptic curves in cryptography, Cambridge University Press.
    13. 13)
      • A.J. Menezes . (1993) Elliptic curve public key cryptosystems.
    14. 14)
      • A. Aziz , W. Diffie . A secure communications protocol to prevent unauthorized access: Privacyand authentication for wireless local area networks. IEEE Pers. Commun. , 25 - 31
    15. 15)
      • Ç.K. Koç , T. Acar , B.S. Kaliski . Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro , 3 , 26 - 33
    16. 16)
      • H. Cohen , A. Miyaji , T. Ono , K. Ohta , D. Pei . (1998) Efficient elliptic curve exponentiation using mixed coordinates, Advances in cryptology - ASIACRYPT 98.
    17. 17)
      • CERTICOM.: SigGen Smart Card. 1997, http://205.150.149.57/ce2/embed.htm.
    18. 18)
      • M.J. Beller , L.F. Chang , J. Yacobi . Privacy and authentication on a portable communications systems. IEEE J. Sel. Areas Commun. , 6 , 821 - 829
    19. 19)
      • K. Itoh , M. Takenaka , N. Torii , S. Temma , Y. Kurihara , Ç.K. Koç , C. Paar . (1999) Fast implementation of public-key cryptography on a dsp tms320c6201, Cryptographic hardware and embedded systems.
    20. 20)
      • N. Koblitz . (1994) A course in number theory and cryptography.
http://iet.metastore.ingenta.com/content/journals/10.1049/ip-com_20010511
Loading

Related content

content/journals/10.1049/ip-com_20010511
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address