Paper 2016/712

A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems

Basel Halak, Said Subhan Waizi, and Asad Islam

Abstract

Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implementations to hardware/software co-designs. The following review provides an overview of state of the art hardware implementations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Preprint. MINOR revision.
Keywords
Elliptic Curve Cryptographypublic keycryptoprocessorcryptographic coprocessorinstruction set extensionhardwaresoftware codesign
Contact author(s)
bh9 @ ecs soton ac uk
History
2016-07-21: received
Short URL
https://ia.cr/2016/712
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/712,
      author = {Basel Halak and Said Subhan Waizi and Asad Islam},
      title = {A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/712},
      year = {2016},
      url = {https://eprint.iacr.org/2016/712}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.