Analysis of Efficient Implementation of Elliptic Curve Cryptography Architecture for Resource Constraint Application

Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmission with low cost, small key size and smaller hardware realization. High-speed implementation is a significant factor in ECC applications such as smart cards, network servers, wireless sensor based...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of innovative technology and exploring engineering Vol. 10; no. 12; pp. 28 - 35
Main Authors Patel, Kirit V., Shah, Dr. Mihir V.
Format Journal Article
LanguageEnglish
Published 30.10.2021
Online AccessGet full text
ISSN2278-3075
2278-3075
DOI10.35940/ijitee.F8701.10101221

Cover

Abstract Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmission with low cost, small key size and smaller hardware realization. High-speed implementation is a significant factor in ECC applications such as smart cards, network servers, wireless sensor based networks, Internet of Things and Radio Frequency Identification. These applications require low-cost and lightweight implementations. In the resource constrain application, lightweight cryptography has emerged as the desired one because of limited energy in devices and the scarce computational resources. Design options and a wide range of parameters affect the overall implementation of the ECC system. Implementation target device, coordinate system, underlying finite fields and modular arithmetic algorithms are key design parameters that impact the overall implementation outcome. A statistical study is conducted on a large collection of published work based on the design parameters. The basic question that arises is how to select the appropriate flexibility-efficiency tradeoff. The subjects of generator, versatile, reconfigurable, dedicated and general purpose scalar multipliers are addressed. A review of various algorithms to perform scalar multiplication on prime and binary fields has been done more effectively. The results of ECC implementation on different FPGA platform is compared and analyzed with the various performance parameters. Besides, a classification of the previous works in terms of flexibility, performance, scalability and cost effectiveness is presented.
AbstractList Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmission with low cost, small key size and smaller hardware realization. High-speed implementation is a significant factor in ECC applications such as smart cards, network servers, wireless sensor based networks, Internet of Things and Radio Frequency Identification. These applications require low-cost and lightweight implementations. In the resource constrain application, lightweight cryptography has emerged as the desired one because of limited energy in devices and the scarce computational resources. Design options and a wide range of parameters affect the overall implementation of the ECC system. Implementation target device, coordinate system, underlying finite fields and modular arithmetic algorithms are key design parameters that impact the overall implementation outcome. A statistical study is conducted on a large collection of published work based on the design parameters. The basic question that arises is how to select the appropriate flexibility-efficiency tradeoff. The subjects of generator, versatile, reconfigurable, dedicated and general purpose scalar multipliers are addressed. A review of various algorithms to perform scalar multiplication on prime and binary fields has been done more effectively. The results of ECC implementation on different FPGA platform is compared and analyzed with the various performance parameters. Besides, a classification of the previous works in terms of flexibility, performance, scalability and cost effectiveness is presented.
Author Shah, Dr. Mihir V.
Patel, Kirit V.
Author_xml – sequence: 1
  givenname: Kirit V.
  surname: Patel
  fullname: Patel, Kirit V.
– sequence: 2
  givenname: Dr. Mihir V.
  surname: Shah
  fullname: Shah, Dr. Mihir V.
BookMark eNqFkGFLwzAQhoNMcM79Bckf6Lw0adqAX8rYVBgIop9Ld0tcRteUJBP6762dgvhF7sMd3L0v7z3XZNK6VhNyy2DBMyXgzh5s1HqxLnJgCwZDpSm7INM0zYuEQ55Nfs1XZB7CAQAYF6yQakpi2dZNH2ygztCVMRatbiN9OnaNPg5THa1rx13T2C5apMuT_9B06fsuundfd_uelh73QwqMJ6-pcZ6-6OBOHocz14boaztYll3XWBz9bsilqZug5999Rt7Wq9flY7J5fnhalpsEmShYoqQxoDRHA6mRwIxkUuRixxB3xVZkUhWIwDKGUhnMVMqR18AFbHPBjdryGbk_-6J3IXhtKrTnj74yNRWDaoRYnSFWI8TqB-Igl3_knbfH2vf_CT8BsGZ8pg
CitedBy_id crossref_primary_10_1016_j_iot_2023_100759
ContentType Journal Article
CorporateAuthor Assistant Professor, Department of Electronics and Communication L. D. College of Engineering, Ahmedabad. (Gujarat), India
Professor, Department of Electronics and Communication L. D. College of Engineering, Ahmedabad. (Gujarat), India
CorporateAuthor_xml – name: Assistant Professor, Department of Electronics and Communication L. D. College of Engineering, Ahmedabad. (Gujarat), India
– name: Professor, Department of Electronics and Communication L. D. College of Engineering, Ahmedabad. (Gujarat), India
DBID AAYXX
CITATION
DOI 10.35940/ijitee.F8701.10101221
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2278-3075
EndPage 35
ExternalDocumentID 10_35940_ijitee_F8701_10101221
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
M~E
OK1
RNS
ID FETCH-LOGICAL-c1481-96ff09e3cf02f601f616474d1ccd8b45698cc0151c69fc5923c3a0340b743f9b3
ISSN 2278-3075
IngestDate Tue Jul 01 02:32:02 EDT 2025
Thu Apr 24 23:04:50 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 12
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c1481-96ff09e3cf02f601f616474d1ccd8b45698cc0151c69fc5923c3a0340b743f9b3
OpenAccessLink https://doi.org/10.35940/ijitee.f8701.10101221
PageCount 8
ParticipantIDs crossref_citationtrail_10_35940_ijitee_F8701_10101221
crossref_primary_10_35940_ijitee_F8701_10101221
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-10-30
PublicationDateYYYYMMDD 2021-10-30
PublicationDate_xml – month: 10
  year: 2021
  text: 2021-10-30
  day: 30
PublicationDecade 2020
PublicationTitle International journal of innovative technology and exploring engineering
PublicationYear 2021
SSID ssj0001341869
Score 2.165698
Snippet Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmission with low cost, small key size and smaller hardware...
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 28
Title Analysis of Efficient Implementation of Elliptic Curve Cryptography Architecture for Resource Constraint Application
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2278-3075
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0001341869
  issn: 2278-3075
  databaseCode: M~E
  dateStart: 20120101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwELYKXJbDClhWsDzkA7cqJe_GR1RACFROsOIW1Y4tgpa2ilyk3cP-q_1_jMd5GFSxwCWqHHmaZD7Z8_I3hByFHHZBwZgXDtPCi6UIvEkkhTdkCY9U4WcTDOiPr9OL2_jyLrnr9f45VUsLzQfiz9JzJZ_RKoyBXs0p2Q9othUKA_Ab9AtX0DBc36Vjl1HkDLkgTGYfCX8f6zNFaA2awoy5YWYdLaon2R9Vv-e6pqrun7iZBFNz2AT0sZcndpDQ1lYVnRIfuvr3Lpz4goTC9lqFP9Nt7B7zFLKt-ZMdE2KXx9K2aOCqrErd_zlo4z_3Ewz_nFaD_ri8L6vmXh2vCLFgrk694LJmzt6aiJfNZcslY8267Lv4C91VNnP2a8t28noniBIWm9rJ8gE-oRycw7IUmEiFySQG3d7X5PtfbYltoSK4SCgpt3JylJM3clbIGkA8NY0zxn-d0B5YBhk2U2zfy55NR1HHSx_JMYsc--Zmg3ytHRN6YlG2SXpyukXWHbrKb0Q3eKMzRVu80Zd4w3s13ijijbp4oy7eKOCNNnijHd6og7dtcnt-djO68OquHZ4A1zrwWKqUz2QklB8qcPdVaijr4iIQosg42OssEwKM0ECkTIkEHAwRTfwo9jkYs4rx6DtZnc6mcodQlmTSdEAEs3QYi4LxMIBZQ8ZCFfOCF7skaT5aLmpKe_Ocv_K39bZLjtt5c0vq8p8ZPz48Y4986dC_T1Z1tZAHYL9qfohoeQYumZ6H
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analysis+of+Efficient+Implementation+of+Elliptic+Curve+Cryptography+Architecture+for+Resource+Constraint+Application&rft.jtitle=International+journal+of+innovative+technology+and+exploring+engineering&rft.au=Patel%2C+Kirit+V.&rft.au=Shah%2C+Dr.+Mihir+V.&rft.date=2021-10-30&rft.issn=2278-3075&rft.eissn=2278-3075&rft.volume=10&rft.issue=12&rft.spage=28&rft.epage=35&rft_id=info:doi/10.35940%2Fijitee.F8701.10101221&rft.externalDBID=n%2Fa&rft.externalDocID=10_35940_ijitee_F8701_10101221
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2278-3075&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2278-3075&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2278-3075&client=summon