Skip to main content
Log in

A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges

  • Survey
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Multi-precision multiplication and squaring are the performance-critical operations for the implementation of public-key cryptography, such as exponentiation in RSA, and scalar multiplication in elliptic curve cryptography (ECC). In this paper, we provide a survey on the multi-precision multiplication and squaring techniques, and make special focus on the comparison of their performance and memory footprint on sensor nodes using 8-bit processors. Different from the previous work, our advantages are in at least three aspects. Firstly, this survey includes the existing techniques for multiprecision multiplication and squaring on sensor nodes over prime fields. Secondly, we analyze and evaluate each method in a systematic and objective way. Thirdly, this survey also provides suggestions for selecting appropriate multiplication and squaring techniques for concrete implementation of public-key cryptography. At the end of this survey, we propose the research challenges on efficient implementation of the multiplication and the squaring operations based on our observation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Uhsadel L, Poschmann A, Paar C. Enabling full-size publickey algorithms on 8-bit sensor nodes. In Proc. the 4th European Workshop on Security and Privacy in Ad-hoc and Sensor Networks, July 2007, pp.73-86.

  2. Watro R J, Kong D, Cuti S F, Gardiner C, Lynn C, Kruus P. TinyPK: Securing sensor networks with public key technology. In Proc. the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, October 2004, pp.59-64.

  3. Liu A, Ning P. Tiny ECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Proc. the 7th International Conference on Information Processing in Sensor Networks, April 2008, pp.245-256.

  4. Hutter M, Schwabe P. NaCl on 8-bit AVR microcontrollers. In Proc. the 6th International Conference on Cryptology in Africa, June 2013, pp.156-172.

  5. Gura N, Patel A, Wander A S, Eberle H, Chang Shantz S. Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In Proc. the 6th International Workshop on Cryptographic Hardware and Embedded Systems, August 2004, pp.119-132.

  6. Hankerson D R, Menezes A J, Vanstone S A. Guide to Elliptic Curve Cryptography. New York, USA: Springer-Verlag, 2004.

  7. Großschädl J, Avanzi R M, Savaş E, Tillich S. Energy-efficient software implementation of long integer modular arithmetic. In Proc. the 7th International Workshop on Cryptographic Hardware and Embedded Systems, August 28-September 1, 2005, pp.75-90.

  8. Knuth D E. The Art of Computer Programming, Volume 2: Seminumerical Algorithms (3rd edition). Boston, MA, USA: Addison-Wesley, 1997.

  9. Comba P G. Exponentiation cryptosystems on the IBM PC. IBM Systems Journal, 1990, 29(4): 526–538.

    Article  Google Scholar 

  10. Karatsuba A A, Ofman Y P. Multiplication of multidigit numbers on automata. Soviet Physics — Doklady, 1963, 7: 595–596.

    Google Scholar 

  11. Wang H, Li Q. Efficient implementation of public key cryptosystems on mote sensors. In Proc. the 8th International Conference on Information and Communications Security, December 2006, pp.519-528.

  12. Ugus O, Westhoff D, Laue R, Shoufan A, Huss S A. Optimized implementation of elliptic curve based additive homomorphic encryption for wireless sensor networks. In Proc. the 2nd Workshop on Embedded Systems Security, October 2007, pp.11-16.

  13. Szczechowiak P, Oliveira L B, Scott M, Collier M, Dahab R. NanoECC: Testing the limits of elliptic curve cryptography in sensor networks. In Proc. the 5th European Conference on Wireless Sensor Networks Wireless, January 30-February 1, 2008, pp.305-320.

  14. Scott M, Szczechowiak P. Optimizing multiprecision multiplication for public key cryptography. Cryptology ePrint Archive, Report 2007/299, 2007. https://eprint.iacr.org/2007/299.pdf, August 2015.

  15. Lederer C, Mader R, Koschuch M, Großschädl J, Szekely A, Tillich S. Energy-efficient implementation of ECDH key exchange for wireless sensor networks. In Proc. the 3rd Workshop on Information Security Theory and Practice, September 2009, pp.112-127.

  16. Liu Z, Großschädl J, Kizhvatov I. Efficient and side-channel resistant RSA implementation for 8-bit AVR microcontrollers. In Proc. the 1st International Workshop on the Security of the Internet of Things, December 2010.

  17. Zhang Y, Großschädl J. Efficient prime-field arithmetic for elliptic curve cryptography on wireless sensor nodes. In Proc. the 2011 International Conference on Computer Science and Network Technology, December 2011, pp.459-466.

  18. Liu Z, Großschädl J. New speed records for Montgomery modular multiplication on 8-bit AVR microcontrollers. In Proc. the 7th International Conference on Cryptology in Africa, May 2014, pp.215-234.

  19. Hutter M,Wenger E. Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. In Proc. the 13th International Workshop on Cryptographic Hardware and Embedded Systems, September 28-October 1, 2011, pp.459-474.

  20. Seo H, Kim H. Multi-precision multiplication for publickey cryptography on embedded microprocessors. In Proc. the 13th International Workshop on Information Security Applications, August 2012, pp.55-67.

  21. Seo H, Kim H. Optimized multi-precision multiplication for public-key cryptography on embedded microprocessors. International Journal of Computer and Communication Engineering, 2013, 2(3): 255–259.

    Article  Google Scholar 

  22. Hutter M, Schwabe P. Multiprecision multiplication on AVR revisited. Cryptology ePrint Archive, Report 2014/592, 2014. https://eprint.iacr.org/2014/592, August 2015.

  23. Hsieh P Y, Laih C S. An exception handling model and its application to the multiple-precision integer library [Master Thesis]. Master of Science, Japan, December 2003.

  24. Lee Y, Kim I H, Park Y. Improved multi-precision squaring for low-end RISC microcontrollers. Journal of Systems and Software, 2013, 86(1): 60–71.

    Article  Google Scholar 

  25. Seo H, Liu Z, Choi J, Kim H. Multi-precision squaring for public-key cryptography on embedded microprocessors. In Proc. the 14th International Conference on Cryptology in India, December 2013, pp.227-243.

  26. Ko¸c C¸ K. High-speed RSA implementation. Technical Report, TR 201, RSA Laboratories, RSA Data Security, Inc., 1994. ftp://ftp.rsasecurity.com/pub/pdfs/tr201.pdf, August 2015.

  27. Kargl A, Pyka S, Seuschek H. Fast arithmetic on ATmega128 for elliptic curve cryptography. Cryptology ePrint Archive, Report 2008/442, 2008. https://eprint.iacr.org/2008/442.pdf, August 2015.

  28. Bernstein D J. Batch binary edwards. In Proc. the 29th International Cryptology Conference, August 2009, pp.317-336.

  29. Montgomery P L. Modular multiplication without trial division. Mathematics of Computation, 1985, 44(170): 519–521.

    Article  MathSciNet  MATH  Google Scholar 

  30. López J, Dahab R. High-speed software multiplication in \( \mathbb{F} \) 2 m. In Proc. the 1st International Conference on Cryptology in India, December 2000, pp.203-212.

  31. Oliveira L B, Aranha D F, Gouvêa C P, Scott M, Câmara D F, López J, Dahab R. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks. Computer Communications, 2011, 34(3): 485–493.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhe Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, Z., Seo, H. & Kim, H. A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges. J. Comput. Sci. Technol. 31, 284–299 (2016). https://doi.org/10.1007/s11390-016-1627-5

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-016-1627-5

Keywords

Navigation