Abstract
This paper presents an efficient implementation of elliptic curve cryptosystems over a prime field on ARM7 with the help of a hardware accelerator. The hardware accelerator has two dedicated large number arithmetic units (LNAU’s). Three different implementation platforms are considered: ARM7, ARM7 with one LNAU, and ARM7 with two LNAU’s. The time costs for performing point multiplication are measured for all three platforms. On ARM7 with 2 LNAU’s platform, we achieved the point multiplication in 18 ms with the chip running at 50 MHz clock frequency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
G.B. Abnew, R. C. Mullin, and S. A. Vanstone. An implementation of eliptic curve cryptosystems over GF (2155). IEEE Journal on SAC, 11(5), June 1993.
I. Blake, G. Seroussi, and N. Smart. Elliptic Curves in Cryptography. Cambridge University Press, 2000.
M. Brown, D. Hankerson, J. Hernandez, and A. Menezes. Software implementa-tion of elliptic curve cryptography over binary fields. Lecture Notes in Computer Science, Springer-Verlag, 2000. Cryptographic Hardware and Embedded Systems-CHES 2000.
J.W.S. Cassels. Lectures on Elliptic Curves. LSM Student Texts, Cambridge University Press, 1991.
J.W. Chung, S. G. Sim, and P. J. Lee. Fast implementation of elliptic curve defined over GF (pm) on C alm RISC with MAC 2424 coprocessor. In C. K. Koc. and C. Paar, editors, Proceedings of the Second Workshop on Cryptographic Hardware and Embedded Systems-CHES ’00, pages 57–70, 2000.
D. V. Bailey, D. Woodbury and C. Paar. Elliptic curve cryptography on smart cards without coprocessors. In IFIPCARDIS 2000, Fourth Smart card Research and Advanced Application Conference, Bristol, UK, September 20–22 2000. Kluwer, 2000.
J. Guajardo, R. Bl. umel, U. Krieger, and C. Paar. Efficient implementation of elliptic curve cryptosystems on the TI MSP 430x33x family of microcontrollers. Fourth International Workshop on Practice and Theory in Public Key Cryptography-PKC 2001, 2001.
G. Hachez, F. Koeune, and J.-J. Quisquater. Timing attack: what can be achieved by apowerful adversary? Proceedings of the 20th symposium on Information Theory in the Benelux, pages 63–70, May 1999.
T. Hasegawa, J. Nakajima, and M. Matsui. A practical implementation of elliptic curve cryptosystems over GF (p) on a 16-bit microcomputer. In Hideki Imai and Yuiliang Zheng, editors, First International Workshop on Practise and Theory in Public Key Cryptography-PKC ’98, LNCS 1431:182–194, 1998. Springer-Verlag.
IEEE. IEEEP 1363 standard specifications for public key cryptography. 1999.
ISES. PCC-ISES datasheet, http://www.secure-a-link.com /pdfs/isespdf/isesdata.pdf.
K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara. Fast implementation of public-key cryptography over GF (p) on a 16-bit microcomputer. In C. K. Koc. and C. Paar, editors, Proceedings of the First Workshop on Cryptographic Hardware and Embedded Systems-CHES ’99, LNCS 1717:61–72, 1999. Springer-Verlag.
M. Joye and J. J. Quisquater. Hessian elliptic curves and side-channel attacks. In C. K. Koc. and D. Naccache and C. Paar, editors, Proceedings of the Third Workshop on Cryptographic Hardware and Embedded Systems-CHES ’01, 2001.
N. Koblitz. Elliptic curve cryptosystem. Mathematics in Computation, (48):203–209, 1987.
N. Koblitz, A. Menezes, and S. Vanstone. The state of elliptic curve cryptography. Designs, Codes and Cryptography, (19):173–193, 2000.
P. Kocher, J. Jaffe, and B. Jun. Differential power analysis. Lecture Notes in Computer Science, Springer-Verlag, pages 388–397, 1999. Advances in Cryptology-CRYPTO 99.
A. Lenstra and E. Verheul. Selecting cryptographic key sizes. In Hideki Imai and Yuiliang Zheng, editors, Third International Workshop on Practice and Theory in Public Key Cryptography-PKC 2000, LNCS 1751.
C. H. Lim and H. S. Hwang. Fast implementation of elliptic curve arithmetic in GF (pn). In Hideki Imai and Yuiliang Zheng, editors, Third International Workshop on Practice and Theory in Public Key Cryptography-PKC 2000, LNCS 1751:405–421.
A. Menezes. Elliptic curve public key cryptosystems. Kluwer Academic Publishers, 1993.
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of applied cryptography. CRC Press, 1997.
A. J. Menezes, D. Hankerson, J. Lopez, and M. Brown. Software implementation of the NIST elliptic curves over prime fields. In D. Naccache, editors, Topics in Cryptology-CT-RSA 2001, The Cryptographer’s Track at RSA Conference 2001 San Francisco, CA, USA, April 8–12, 2001, LNCS 2020, 2001.
V. Miller. Use of elliptic curves in cryptography. Advances in Cryptography-Crypto’85, LNCS 218:417–426, 1986. Springer-Verlag.
P. Montgomery. Modular multiplication without trial division. Mathematics of Computation, Vol. 44:519–521, 1985.
NIST. NIST Documents, recommended elliptic curves for federal government use. July 1999.
H. Nozaki, M. Motoyama, A. Shimbo, and S. Kawamura. Implementation of RSA algorithm based on RNS montgomery multiplication. In C. K. Kocç and D. Naccache and C. Paar, editors, Proceedings of the Third Workshop on Cryptographic Hardware and Embedded Systems-CHES ’01, 2001.
N. P. Smart. The H essian form of an elliptic curve. In C. K. Koç and D. Naccache and C. Paar, editors, Proceedings of the Third Workshop on Cryptographic Hardware and Embedded Systems-CHES ’01, 2001.
C.D. Walter. Safely reducing the number of iterations in Montgomery modular multiplication. 2001. preprint.
C.D. Walter and S. Thompson. Distinguishing exponent digits by observing modular subtractions. Lecture Notes in Computer Science, Springer-Verlag, (2020):192–207, 2001. Topics in Cryptology-CT-RSA 2001.
E. De Win, A. Bosselaers, and S. Vandenberghe. A fast software implementation for arithmetic operations in GF (2n). Advances in Cryptology-Proceedings of Asiacrypt ’96, Lecture notes in computer science, LNCS 1163:65–76, 1996.
E. De Win, S. Minster, and M. Wiener. On the performance of signature schemes based on elliptic curves. Algorithmic Number Theory, Proceedings Third Intern. Symp., ANTS-III(1423):252–266, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xu, SB., Batina, L. (2001). Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_18
Download citation
DOI: https://doi.org/10.1007/3-540-45439-X_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42662-2
Online ISBN: 978-3-540-45439-7
eBook Packages: Springer Book Archive