Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks

This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain str...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Batina, Lejla, Mentens, Nele, Sakiyama, Kazuo, Preneel, Bart, Verbauwhede, Ingrid
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 17
container_issue
container_start_page 6
container_title
container_volume
creator Batina, Lejla
Mentens, Nele
Sakiyama, Kazuo
Preneel, Bart
Verbauwhede, Ingrid
description This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain stronger cryptography as well as to minimize the power. Our compact and low-power ECC processor contains a Modular Arithmetic Logic Unit (MALU) for ECC field arithmetic. The best solution features 6718 gates for the MALU and control unit (data memory not included) in 0.13 μm CMOS technology over the field \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}${\mathbb{F}_{2^{131}}}$\end{document}, which provides a reasonable level of security for the time being. In this case the consumed power is less than 30 μW when operating frequency is 500 kHz.
doi_str_mv 10.1007/11964254_3
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19937805</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19937805</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-82676cb52e5214884ce0dc7a318b73c6cab7dc84c0aef0ead9b33ab5a07181443</originalsourceid><addsrcrecordid>eNpVkM1LxDAQxeMXuKx78S_oRfBSzWSSJjkuZf2ARQ8qHkOaTde6dVOS6tL_3soK4lwe836PgXmEnAO9AkrlNYAuOBPc4AGZaalQcFpokEgPyQQKgByR66N_jOExmVCkLNeS4ymZpfROx0HQmosJmS_DLi9D6rNF2zZd37is_IxfPivj0PVhHW33NmR1iNlrE33rU8qe_DaN-4PvdyFu0hk5qW2b_OxXp-TlZvFc3uXLx9v7cr7MHdOizxUrZOEqwbxgwJXiztOVkxZBVRJd4WwlV260qfU19XalK0RbCUslKOAcp-Rif7ezydm2jnbrmmS62HzYOJjxH5SKijF3uc-lEW3XPpoqhE0yQM1Pi-avRfwGYWheRw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks</title><source>Springer Books</source><creator>Batina, Lejla ; Mentens, Nele ; Sakiyama, Kazuo ; Preneel, Bart ; Verbauwhede, Ingrid</creator><contributor>Buttyán, Levente ; Gligor, Virgil D. ; Westhoff, Dirk</contributor><creatorcontrib>Batina, Lejla ; Mentens, Nele ; Sakiyama, Kazuo ; Preneel, Bart ; Verbauwhede, Ingrid ; Buttyán, Levente ; Gligor, Virgil D. ; Westhoff, Dirk</creatorcontrib><description>This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain stronger cryptography as well as to minimize the power. Our compact and low-power ECC processor contains a Modular Arithmetic Logic Unit (MALU) for ECC field arithmetic. The best solution features 6718 gates for the MALU and control unit (data memory not included) in 0.13 μm CMOS technology over the field \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}${\mathbb{F}_{2^{131}}}$\end{document}, which provides a reasonable level of security for the time being. In this case the consumed power is less than 30 μW when operating frequency is 500 kHz.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540691723</identifier><identifier>ISBN: 3540691723</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540691730</identifier><identifier>EISBN: 3540691731</identifier><identifier>DOI: 10.1007/11964254_3</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithmics. Computability. Computer arithmetics ; Applied sciences ; authentication ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Elliptic Curve Cryptography ; Exact sciences and technology ; hardware implementation ; Information, signal and communications theory ; key-distribution ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; pervasive computing ; sensor networks ; Signal and communications theory ; Software ; Telecommunications and information theory ; Theoretical computing</subject><ispartof>Lecture notes in computer science, 2006, p.6-17</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2008 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-82676cb52e5214884ce0dc7a318b73c6cab7dc84c0aef0ead9b33ab5a07181443</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11964254_3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11964254_3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=19937805$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Buttyán, Levente</contributor><contributor>Gligor, Virgil D.</contributor><contributor>Westhoff, Dirk</contributor><creatorcontrib>Batina, Lejla</creatorcontrib><creatorcontrib>Mentens, Nele</creatorcontrib><creatorcontrib>Sakiyama, Kazuo</creatorcontrib><creatorcontrib>Preneel, Bart</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><title>Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks</title><title>Lecture notes in computer science</title><description>This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain stronger cryptography as well as to minimize the power. Our compact and low-power ECC processor contains a Modular Arithmetic Logic Unit (MALU) for ECC field arithmetic. The best solution features 6718 gates for the MALU and control unit (data memory not included) in 0.13 μm CMOS technology over the field \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}${\mathbb{F}_{2^{131}}}$\end{document}, which provides a reasonable level of security for the time being. In this case the consumed power is less than 30 μW when operating frequency is 500 kHz.</description><subject>Algorithmics. Computability. Computer arithmetics</subject><subject>Applied sciences</subject><subject>authentication</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Elliptic Curve Cryptography</subject><subject>Exact sciences and technology</subject><subject>hardware implementation</subject><subject>Information, signal and communications theory</subject><subject>key-distribution</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>pervasive computing</subject><subject>sensor networks</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><subject>Theoretical computing</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540691723</isbn><isbn>3540691723</isbn><isbn>9783540691730</isbn><isbn>3540691731</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkM1LxDAQxeMXuKx78S_oRfBSzWSSJjkuZf2ARQ8qHkOaTde6dVOS6tL_3soK4lwe836PgXmEnAO9AkrlNYAuOBPc4AGZaalQcFpokEgPyQQKgByR66N_jOExmVCkLNeS4ymZpfROx0HQmosJmS_DLi9D6rNF2zZd37is_IxfPivj0PVhHW33NmR1iNlrE33rU8qe_DaN-4PvdyFu0hk5qW2b_OxXp-TlZvFc3uXLx9v7cr7MHdOizxUrZOEqwbxgwJXiztOVkxZBVRJd4WwlV260qfU19XalK0RbCUslKOAcp-Rif7ezydm2jnbrmmS62HzYOJjxH5SKijF3uc-lEW3XPpoqhE0yQM1Pi-avRfwGYWheRw</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Batina, Lejla</creator><creator>Mentens, Nele</creator><creator>Sakiyama, Kazuo</creator><creator>Preneel, Bart</creator><creator>Verbauwhede, Ingrid</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks</title><author>Batina, Lejla ; Mentens, Nele ; Sakiyama, Kazuo ; Preneel, Bart ; Verbauwhede, Ingrid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-82676cb52e5214884ce0dc7a318b73c6cab7dc84c0aef0ead9b33ab5a07181443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Algorithmics. Computability. Computer arithmetics</topic><topic>Applied sciences</topic><topic>authentication</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Elliptic Curve Cryptography</topic><topic>Exact sciences and technology</topic><topic>hardware implementation</topic><topic>Information, signal and communications theory</topic><topic>key-distribution</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>pervasive computing</topic><topic>sensor networks</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><topic>Theoretical computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Batina, Lejla</creatorcontrib><creatorcontrib>Mentens, Nele</creatorcontrib><creatorcontrib>Sakiyama, Kazuo</creatorcontrib><creatorcontrib>Preneel, Bart</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Batina, Lejla</au><au>Mentens, Nele</au><au>Sakiyama, Kazuo</au><au>Preneel, Bart</au><au>Verbauwhede, Ingrid</au><au>Buttyán, Levente</au><au>Gligor, Virgil D.</au><au>Westhoff, Dirk</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks</atitle><btitle>Lecture notes in computer science</btitle><date>2006</date><risdate>2006</risdate><spage>6</spage><epage>17</epage><pages>6-17</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540691723</isbn><isbn>3540691723</isbn><eisbn>9783540691730</eisbn><eisbn>3540691731</eisbn><abstract>This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain stronger cryptography as well as to minimize the power. Our compact and low-power ECC processor contains a Modular Arithmetic Logic Unit (MALU) for ECC field arithmetic. The best solution features 6718 gates for the MALU and control unit (data memory not included) in 0.13 μm CMOS technology over the field \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}${\mathbb{F}_{2^{131}}}$\end{document}, which provides a reasonable level of security for the time being. In this case the consumed power is less than 30 μW when operating frequency is 500 kHz.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11964254_3</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Lecture notes in computer science, 2006, p.6-17
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_19937805
source Springer Books
subjects Algorithmics. Computability. Computer arithmetics
Applied sciences
authentication
Computer science
control theory
systems
Computer systems and distributed systems. User interface
Cryptography
Elliptic Curve Cryptography
Exact sciences and technology
hardware implementation
Information, signal and communications theory
key-distribution
Memory and file management (including protection and security)
Memory organisation. Data processing
pervasive computing
sensor networks
Signal and communications theory
Software
Telecommunications and information theory
Theoretical computing
title Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T12%3A28%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Low-Cost%20Elliptic%20Curve%20Cryptography%20for%20Wireless%20Sensor%20Networks&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Batina,%20Lejla&rft.date=2006&rft.spage=6&rft.epage=17&rft.pages=6-17&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540691723&rft.isbn_list=3540691723&rft_id=info:doi/10.1007/11964254_3&rft_dat=%3Cpascalfrancis_sprin%3E19937805%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540691730&rft.eisbn_list=3540691731&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true