The University of Southampton
University of Southampton Institutional Repository

A survey of hardware implementations of elliptic curve cryptographic systems

A survey of hardware implementations of elliptic curve cryptographic systems
A survey of hardware implementations of elliptic curve cryptographic systems
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implemenations to hardware/software co-designs. The following review provides an overview of state of the art hardware implemenations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem.
Cryptology ePrint Archive
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Waizi, Said Subhan
2180769b-838f-4ab3-9d07-3a7fffbdb8c0
Islam, Asad
f1f6b3ad-5e72-4246-a943-77f0d3fcb14c
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Waizi, Said Subhan
2180769b-838f-4ab3-9d07-3a7fffbdb8c0
Islam, Asad
f1f6b3ad-5e72-4246-a943-77f0d3fcb14c

Halak, Basel, Waizi, Said Subhan and Islam, Asad (2016) A survey of hardware implementations of elliptic curve cryptographic systems Santa Barbara, US. Cryptology ePrint Archive 5pp. (In Press)

Record type: Monograph (Project Report)

Abstract

Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implemenations to hardware/software co-designs. The following review provides an overview of state of the art hardware implemenations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem.

Text
Final.pdf - Accepted Manuscript
Download (180kB)

More information

Accepted/In Press date: 1 July 2016
Organisations: EEE

Identifiers

Local EPrints ID: 398632
URI: http://eprints.soton.ac.uk/id/eprint/398632
PURE UUID: 17782354-4386-4d70-b59d-1503badd6413
ORCID for Basel Halak: ORCID iD orcid.org/0000-0003-3470-7226

Catalogue record

Date deposited: 28 Jul 2016 10:04
Last modified: 15 Mar 2024 03:39

Export record

Contributors

Author: Basel Halak ORCID iD
Author: Said Subhan Waizi
Author: Asad Islam

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×