Paper 2016/712
A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems
Basel Halak, Said Subhan Waizi, and Asad Islam
Abstract
Elliptic Curve Cryptography (ECC) has gained much recognition over the last decades and has established itself among the well known public-key cryptography schemes, not least due its smaller key size and relatively lower computational effort compared to RSA. The wide employment of Elliptic Curve Cryptography in many different application areas has been leading to a variety of implementation types and domains ranging from pure software approaches over hardware implementations to hardware/software co-designs. The following review provides an overview of state of the art hardware implementations of ECC, specifically in regard to their targeted design goals. In this context the suitability of the hardware/software approach in regard to the security challenges opposed by the low-end embedded devices of the Internet of Things is briefly examined. The paper also outlines ECC’s vulnerability against quantum attacks and references one possible solution to that problem.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Preprint. MINOR revision.
- Keywords
- Elliptic Curve Cryptographypublic keycryptoprocessorcryptographic coprocessorinstruction set extensionhardwaresoftware codesign
- Contact author(s)
- bh9 @ ecs soton ac uk
- History
- 2016-07-21: received
- Short URL
- https://ia.cr/2016/712
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/712, author = {Basel Halak and Said Subhan Waizi and Asad Islam}, title = {A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/712}, year = {2016}, url = {https://eprint.iacr.org/2016/712} }