A survey of hardware implementations of elliptic curve cryptographic systems
A survey of hardware implementations of elliptic curve cryptographic systems
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implemenations to hardware/software co-designs. The following review provides an overview of state of the art hardware implemenations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem.
Cryptology ePrint Archive
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Waizi, Said Subhan
2180769b-838f-4ab3-9d07-3a7fffbdb8c0
Islam, Asad
f1f6b3ad-5e72-4246-a943-77f0d3fcb14c
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Waizi, Said Subhan
2180769b-838f-4ab3-9d07-3a7fffbdb8c0
Islam, Asad
f1f6b3ad-5e72-4246-a943-77f0d3fcb14c
Halak, Basel, Waizi, Said Subhan and Islam, Asad
(2016)
A survey of hardware implementations of elliptic curve cryptographic systems
Santa Barbara, US.
Cryptology ePrint Archive
5pp.
(In Press)
Record type:
Monograph
(Project Report)
Abstract
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implemenations to hardware/software co-designs. The following review provides an overview of state of the art hardware implemenations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem.
Text
Final.pdf
- Accepted Manuscript
More information
Accepted/In Press date: 1 July 2016
Organisations:
EEE
Identifiers
Local EPrints ID: 398632
URI: http://eprints.soton.ac.uk/id/eprint/398632
PURE UUID: 17782354-4386-4d70-b59d-1503badd6413
Catalogue record
Date deposited: 28 Jul 2016 10:04
Last modified: 15 Mar 2024 03:39
Export record
Contributors
Author:
Basel Halak
Author:
Said Subhan Waizi
Author:
Asad Islam
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics