Implementation of Binary Edwards Curves for Very-Constrained Devices
Elliptic Curve Cryptography (ECC) is considered as the best candidate for Public-Key Cryptosystems (PKC) for ubiquitous security. Recently, Elliptic Curve Cryptography (ECC) based on Binary Edwards Curves (BEC) has been proposed and it shows several interesting properties, e.g., completeness and security against certain exceptional-points attacks. In this paper, the authors propose a hardware implementation of the BEC for extremely constrained devices. The w-coordinates and Montgomery powering ladder are used. Next, they also give techniques to reduce the register file size, which is the largest component of the embedded core. Thirdly, they apply gated clocking to reduce the overall power consumption.
Provided by: Institute of Electrical & Electronic Engineers Topic: Security Date Added: Aug 2010 Format: PDF