Abstract
In this paper, the Low power Elliptic Curve Cryptography (ECC) structure over Galois field \(GF({2^m})\) is studied and implemented on the Application Specific Integrated Circuit (ASIC) tool for wireless sensor network and Internet of Things (IoT) Applications. Clock gating technique is used for decreasing power consumption. The implementation is conducted by the 180 nm CMOS standard library shows that the proposed ECC structure has the power consumption of 10.4 \(\upmu \)W/MHz outweigh than previous designs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Du, X., Chen, H.-H.: Security in wireless sensor networks. IEEE Wireless Commun. 15(4), 60–66 (2008)
Bari, N., Mani, G., Berkovich, S.: Internet of things as a methodological concept. In: 2013 Fourth International Conference on Computing for Geospatial Research and Application (COM.Geo), San Jose, CA, pp. 48–55 (2013)
Hac, A.: Wireless Sensor Network Designs. Wiley, New York (2013)
Tiwari, A., et al.: Energy-efficient wireless sensor network design and implementation for condition-based maintenance. ACM Trans. Sensor Netw. (TOSN) 3(1), 1–23 (2007)
Yun, D.S., Lee, S.-J., Kim, D.H.: A study on the vehicular wireless base-station for in-vehicle wireless sensor network system. In: Proceedings of 2014 International Conference on Information and Communication Technology Convergence, pp. 609–610, October 2014
Ding, R., Hou, J., Xing, B.: Research of wireless sensor network nodes based on ambient energy harvesting. In: Proceedings of 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), pp. 286–288, November 2013
Liu, Y., Wang, C., Qiao, X., Zhang, Y., Yu, C.: An improved design of ZigBee wireless sensor network. In: Proceedings of 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2009), pp. 515–518, August 2009
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). doi:10.1007/3-540-39799-X_31
Koblitz, N., Menezes, A., Vanstone, S.: The state of elliptic curve cryptography. Des. Codes Crypt. 19(2–3), 173–193 (2000)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)
Zhong, W.J., Noh, N.M., Rosdi, B.A.: Clock gating assertion check: an approach towards achieving faster verification closure on clock gating functionality. In: 2015 6th Asia Symposium on Quality Electronic Design (ASQED), Kula Lumpur, pp. 94–101 (2015)
Wimer, S., Koren, I.: Design flow for flip-flop grouping in data-driven clock gating. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 22(4), 771–778 (2014)
Nikolić, M., Katona, M.: Improve the automatic clock gating insertion in ASIC synthesis process using optimal enable function selection. In: 2010 5th European Conference on Circuits and Systems for Communications (ECCSC), Belgrade, pp. 131–134 (2010)
Deschamps, J.-P., Imaãa, J.L., Sutter, G.D.: Hardware Implementation of Finite-Field Arithmetic, 1st edn. Publisher of McGraw-Hill Education, New York (2009)
National Institute of Standards and Technology (NIST): Digital Signature Standard (DDS). FIPS Publication 186-3, June 2009
Bertoni, G., Breveglieri, L., Venturi, M.: ECC hardware coprocessors for 8-bit systems, power consumption considerations. In: Third International Conference on Information Technology: New Generations, 2006, ITNG 2006, Las Vegas, NV, pp. 573–574 (2006)
Purnaprajna, M., Puttmann, C., Porrmann, M.: Power aware reconfigurable multiprocessor for elliptic curve cryptography. In: Design, Automation and Test in Europe, 2008, Munich, pp. 1462–1467 (2008)
Ahmadi, H.R., Afzali-Kusha, A.: Low-power low-energy prime-field ECC processor based on montgomery modular inverse algorithm. In: 12th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, 2009, Patras, pp. 817–822 (2009)
Feldhofer, M., Wolkerstorfer, J.: Strong crypto for RFID tags - comparison of low-power hardware implementations. In: ISCAS 2007, pp. 1839–1842 (2007)
Batina, L., et al.: Public-key cryptography on the top of a needle. In: ISCAS 2007, pp. I831–1834 (2007)
Gaubatz, G., et al.: State of the art in ultra-low power public key cryptography for wireless sensor networks. In: 3rd IEEE PerCom 2005 Workshops, pp. 146–150 (2005)
de Dormale, G.M., Ambroise, R., Bol, D., Quisquater, J.J., Legat, J.D.: Low-cost elliptic curve digital signature coprocessor for smart cards. In: Proceedings of the IEEE 17th International Conference on Application-Specific Systems, Architectures and Processors, ASAP 06, pp. 347–353 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Dao, VL., Nguyen, VT., Hoang, VP. (2017). Low Power ECC Implementation on ASIC. In: Akagi, M., Nguyen, TT., Vu, DT., Phung, TN., Huynh, VN. (eds) Advances in Information and Communication Technology. ICTA 2016. Advances in Intelligent Systems and Computing, vol 538. Springer, Cham. https://doi.org/10.1007/978-3-319-49073-1_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-49073-1_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49072-4
Online ISBN: 978-3-319-49073-1
eBook Packages: EngineeringEngineering (R0)