Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks
This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain str...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 17 |
---|---|
container_issue | |
container_start_page | 6 |
container_title | |
container_volume | |
creator | Batina, Lejla Mentens, Nele Sakiyama, Kazuo Preneel, Bart Verbauwhede, Ingrid |
description | This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain stronger cryptography as well as to minimize the power. Our compact and low-power ECC processor contains a Modular Arithmetic Logic Unit (MALU) for ECC field arithmetic. The best solution features 6718 gates for the MALU and control unit (data memory not included) in 0.13 μm CMOS technology over the field \documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}${\mathbb{F}_{2^{131}}}$\end{document}, which provides a reasonable level of security for the time being. In this case the consumed power is less than 30 μW when operating frequency is 500 kHz. |
doi_str_mv | 10.1007/11964254_3 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_19937805</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>19937805</sourcerecordid><originalsourceid>FETCH-LOGICAL-c295t-82676cb52e5214884ce0dc7a318b73c6cab7dc84c0aef0ead9b33ab5a07181443</originalsourceid><addsrcrecordid>eNpVkM1LxDAQxeMXuKx78S_oRfBSzWSSJjkuZf2ARQ8qHkOaTde6dVOS6tL_3soK4lwe836PgXmEnAO9AkrlNYAuOBPc4AGZaalQcFpokEgPyQQKgByR66N_jOExmVCkLNeS4ymZpfROx0HQmosJmS_DLi9D6rNF2zZd37is_IxfPivj0PVhHW33NmR1iNlrE33rU8qe_DaN-4PvdyFu0hk5qW2b_OxXp-TlZvFc3uXLx9v7cr7MHdOizxUrZOEqwbxgwJXiztOVkxZBVRJd4WwlV260qfU19XalK0RbCUslKOAcp-Rif7ezydm2jnbrmmS62HzYOJjxH5SKijF3uc-lEW3XPpoqhE0yQM1Pi-avRfwGYWheRw</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks</title><source>Springer Books</source><creator>Batina, Lejla ; Mentens, Nele ; Sakiyama, Kazuo ; Preneel, Bart ; Verbauwhede, Ingrid</creator><contributor>Buttyán, Levente ; Gligor, Virgil D. ; Westhoff, Dirk</contributor><creatorcontrib>Batina, Lejla ; Mentens, Nele ; Sakiyama, Kazuo ; Preneel, Bart ; Verbauwhede, Ingrid ; Buttyán, Levente ; Gligor, Virgil D. ; Westhoff, Dirk</creatorcontrib><description>This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain stronger cryptography as well as to minimize the power. Our compact and low-power ECC processor contains a Modular Arithmetic Logic Unit (MALU) for ECC field arithmetic. The best solution features 6718 gates for the MALU and control unit (data memory not included) in 0.13 μm CMOS technology over the field \documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}${\mathbb{F}_{2^{131}}}$\end{document}, which provides a reasonable level of security for the time being. In this case the consumed power is less than 30 μW when operating frequency is 500 kHz.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540691723</identifier><identifier>ISBN: 3540691723</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540691730</identifier><identifier>EISBN: 3540691731</identifier><identifier>DOI: 10.1007/11964254_3</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithmics. Computability. Computer arithmetics ; Applied sciences ; authentication ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Cryptography ; Elliptic Curve Cryptography ; Exact sciences and technology ; hardware implementation ; Information, signal and communications theory ; key-distribution ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; pervasive computing ; sensor networks ; Signal and communications theory ; Software ; Telecommunications and information theory ; Theoretical computing</subject><ispartof>Lecture notes in computer science, 2006, p.6-17</ispartof><rights>Springer-Verlag Berlin Heidelberg 2006</rights><rights>2008 INIST-CNRS</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c295t-82676cb52e5214884ce0dc7a318b73c6cab7dc84c0aef0ead9b33ab5a07181443</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/11964254_3$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/11964254_3$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4036,4037,27902,38232,41418,42487</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=19937805$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Buttyán, Levente</contributor><contributor>Gligor, Virgil D.</contributor><contributor>Westhoff, Dirk</contributor><creatorcontrib>Batina, Lejla</creatorcontrib><creatorcontrib>Mentens, Nele</creatorcontrib><creatorcontrib>Sakiyama, Kazuo</creatorcontrib><creatorcontrib>Preneel, Bart</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><title>Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks</title><title>Lecture notes in computer science</title><description>This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain stronger cryptography as well as to minimize the power. Our compact and low-power ECC processor contains a Modular Arithmetic Logic Unit (MALU) for ECC field arithmetic. The best solution features 6718 gates for the MALU and control unit (data memory not included) in 0.13 μm CMOS technology over the field \documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}${\mathbb{F}_{2^{131}}}$\end{document}, which provides a reasonable level of security for the time being. In this case the consumed power is less than 30 μW when operating frequency is 500 kHz.</description><subject>Algorithmics. Computability. Computer arithmetics</subject><subject>Applied sciences</subject><subject>authentication</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Cryptography</subject><subject>Elliptic Curve Cryptography</subject><subject>Exact sciences and technology</subject><subject>hardware implementation</subject><subject>Information, signal and communications theory</subject><subject>key-distribution</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>pervasive computing</subject><subject>sensor networks</subject><subject>Signal and communications theory</subject><subject>Software</subject><subject>Telecommunications and information theory</subject><subject>Theoretical computing</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540691723</isbn><isbn>3540691723</isbn><isbn>9783540691730</isbn><isbn>3540691731</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNpVkM1LxDAQxeMXuKx78S_oRfBSzWSSJjkuZf2ARQ8qHkOaTde6dVOS6tL_3soK4lwe836PgXmEnAO9AkrlNYAuOBPc4AGZaalQcFpokEgPyQQKgByR66N_jOExmVCkLNeS4ymZpfROx0HQmosJmS_DLi9D6rNF2zZd37is_IxfPivj0PVhHW33NmR1iNlrE33rU8qe_DaN-4PvdyFu0hk5qW2b_OxXp-TlZvFc3uXLx9v7cr7MHdOizxUrZOEqwbxgwJXiztOVkxZBVRJd4WwlV260qfU19XalK0RbCUslKOAcp-Rif7ezydm2jnbrmmS62HzYOJjxH5SKijF3uc-lEW3XPpoqhE0yQM1Pi-avRfwGYWheRw</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Batina, Lejla</creator><creator>Mentens, Nele</creator><creator>Sakiyama, Kazuo</creator><creator>Preneel, Bart</creator><creator>Verbauwhede, Ingrid</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2006</creationdate><title>Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks</title><author>Batina, Lejla ; Mentens, Nele ; Sakiyama, Kazuo ; Preneel, Bart ; Verbauwhede, Ingrid</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c295t-82676cb52e5214884ce0dc7a318b73c6cab7dc84c0aef0ead9b33ab5a07181443</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Algorithmics. Computability. Computer arithmetics</topic><topic>Applied sciences</topic><topic>authentication</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Cryptography</topic><topic>Elliptic Curve Cryptography</topic><topic>Exact sciences and technology</topic><topic>hardware implementation</topic><topic>Information, signal and communications theory</topic><topic>key-distribution</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>pervasive computing</topic><topic>sensor networks</topic><topic>Signal and communications theory</topic><topic>Software</topic><topic>Telecommunications and information theory</topic><topic>Theoretical computing</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Batina, Lejla</creatorcontrib><creatorcontrib>Mentens, Nele</creatorcontrib><creatorcontrib>Sakiyama, Kazuo</creatorcontrib><creatorcontrib>Preneel, Bart</creatorcontrib><creatorcontrib>Verbauwhede, Ingrid</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Batina, Lejla</au><au>Mentens, Nele</au><au>Sakiyama, Kazuo</au><au>Preneel, Bart</au><au>Verbauwhede, Ingrid</au><au>Buttyán, Levente</au><au>Gligor, Virgil D.</au><au>Westhoff, Dirk</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks</atitle><btitle>Lecture notes in computer science</btitle><date>2006</date><risdate>2006</risdate><spage>6</spage><epage>17</epage><pages>6-17</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540691723</isbn><isbn>3540691723</isbn><eisbn>9783540691730</eisbn><eisbn>3540691731</eisbn><abstract>This work describes a low-cost Public-Key Cryptography (PKC) based solution for security services such as key-distribution and authentication as required for wireless sensor networks. We propose a custom hardware assisted approach to implement Elliptic Curve Cryptography (ECC) in order to obtain stronger cryptography as well as to minimize the power. Our compact and low-power ECC processor contains a Modular Arithmetic Logic Unit (MALU) for ECC field arithmetic. The best solution features 6718 gates for the MALU and control unit (data memory not included) in 0.13 μm CMOS technology over the field \documentclass[12pt]{minimal}
\usepackage{amsmath}
\usepackage{wasysym}
\usepackage{amsfonts}
\usepackage{amssymb}
\usepackage{amsbsy}
\usepackage{mathrsfs}
\usepackage{upgreek}
\setlength{\oddsidemargin}{-69pt}
\begin{document}${\mathbb{F}_{2^{131}}}$\end{document}, which provides a reasonable level of security for the time being. In this case the consumed power is less than 30 μW when operating frequency is 500 kHz.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/11964254_3</doi><tpages>12</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2006, p.6-17 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_19937805 |
source | Springer Books |
subjects | Algorithmics. Computability. Computer arithmetics Applied sciences authentication Computer science control theory systems Computer systems and distributed systems. User interface Cryptography Elliptic Curve Cryptography Exact sciences and technology hardware implementation Information, signal and communications theory key-distribution Memory and file management (including protection and security) Memory organisation. Data processing pervasive computing sensor networks Signal and communications theory Software Telecommunications and information theory Theoretical computing |
title | Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T12%3A28%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Low-Cost%20Elliptic%20Curve%20Cryptography%20for%20Wireless%20Sensor%20Networks&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Batina,%20Lejla&rft.date=2006&rft.spage=6&rft.epage=17&rft.pages=6-17&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540691723&rft.isbn_list=3540691723&rft_id=info:doi/10.1007/11964254_3&rft_dat=%3Cpascalfrancis_sprin%3E19937805%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540691730&rft.eisbn_list=3540691731&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |