Cryptology ePrint Archive: Report 2016/712

A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems

Basel Halak and Said Subhan Waizi and Asad Islam

Abstract: Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implementations to hardware/software co-designs. The following review provides an overview of state of the art hardware implementations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem.

Category / Keywords: implementation / Elliptic Curve Cryptography, public key, cryptoprocessor, cryptographic coprocessor, instruction set extension, hardware/software codesign

Date: received 18 Jul 2016

Contact author: bh9 at ecs soton ac uk

Available format(s): PDF | BibTeX Citation

Version: 20160721:145623 (All versions of this report)

Short URL: ia.cr/2016/712

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]