Analysis of Efficient Implementation of Elliptic Curve Cryptography Architecture for Resource Constraint Application
Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmission with low cost, small key size and smaller hardware realization. High-speed implementation is a significant factor in ECC applications such as smart cards, network servers, wireless sensor based...
Saved in:
Published in | International journal of innovative technology and exploring engineering Vol. 10; no. 12; pp. 28 - 35 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
30.10.2021
|
Online Access | Get full text |
ISSN | 2278-3075 2278-3075 |
DOI | 10.35940/ijitee.F8701.10101221 |
Cover
Abstract | Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmission with low cost, small key size and smaller hardware realization. High-speed implementation is a significant factor in ECC applications such as smart cards, network servers, wireless sensor based networks, Internet of Things and Radio Frequency Identification. These applications require low-cost and lightweight implementations. In the resource constrain application, lightweight cryptography has emerged as the desired one because of limited energy in devices and the scarce computational resources. Design options and a wide range of parameters affect the overall implementation of the ECC system. Implementation target device, coordinate system, underlying finite fields and modular arithmetic algorithms are key design parameters that impact the overall implementation outcome. A statistical study is conducted on a large collection of published work based on the design parameters. The basic question that arises is how to select the appropriate flexibility-efficiency tradeoff. The subjects of generator, versatile, reconfigurable, dedicated and general purpose scalar multipliers are addressed. A review of various algorithms to perform scalar multiplication on prime and binary fields has been done more effectively. The results of ECC implementation on different FPGA platform is compared and analyzed with the various performance parameters. Besides, a classification of the previous works in terms of flexibility, performance, scalability and cost effectiveness is presented. |
---|---|
AbstractList | Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmission with low cost, small key size and smaller hardware realization. High-speed implementation is a significant factor in ECC applications such as smart cards, network servers, wireless sensor based networks, Internet of Things and Radio Frequency Identification. These applications require low-cost and lightweight implementations. In the resource constrain application, lightweight cryptography has emerged as the desired one because of limited energy in devices and the scarce computational resources. Design options and a wide range of parameters affect the overall implementation of the ECC system. Implementation target device, coordinate system, underlying finite fields and modular arithmetic algorithms are key design parameters that impact the overall implementation outcome. A statistical study is conducted on a large collection of published work based on the design parameters. The basic question that arises is how to select the appropriate flexibility-efficiency tradeoff. The subjects of generator, versatile, reconfigurable, dedicated and general purpose scalar multipliers are addressed. A review of various algorithms to perform scalar multiplication on prime and binary fields has been done more effectively. The results of ECC implementation on different FPGA platform is compared and analyzed with the various performance parameters. Besides, a classification of the previous works in terms of flexibility, performance, scalability and cost effectiveness is presented. |
Author | Shah, Dr. Mihir V. Patel, Kirit V. |
Author_xml | – sequence: 1 givenname: Kirit V. surname: Patel fullname: Patel, Kirit V. – sequence: 2 givenname: Dr. Mihir V. surname: Shah fullname: Shah, Dr. Mihir V. |
BookMark | eNqFkGFLwzAQhoNMcM79Bckf6Lw0adqAX8rYVBgIop9Ld0tcRteUJBP6762dgvhF7sMd3L0v7z3XZNK6VhNyy2DBMyXgzh5s1HqxLnJgCwZDpSm7INM0zYuEQ55Nfs1XZB7CAQAYF6yQakpi2dZNH2ygztCVMRatbiN9OnaNPg5THa1rx13T2C5apMuT_9B06fsuundfd_uelh73QwqMJ6-pcZ6-6OBOHocz14boaztYll3XWBz9bsilqZug5999Rt7Wq9flY7J5fnhalpsEmShYoqQxoDRHA6mRwIxkUuRixxB3xVZkUhWIwDKGUhnMVMqR18AFbHPBjdryGbk_-6J3IXhtKrTnj74yNRWDaoRYnSFWI8TqB-Igl3_knbfH2vf_CT8BsGZ8pg |
CitedBy_id | crossref_primary_10_1016_j_iot_2023_100759 |
ContentType | Journal Article |
CorporateAuthor | Assistant Professor, Department of Electronics and Communication L. D. College of Engineering, Ahmedabad. (Gujarat), India Professor, Department of Electronics and Communication L. D. College of Engineering, Ahmedabad. (Gujarat), India |
CorporateAuthor_xml | – name: Assistant Professor, Department of Electronics and Communication L. D. College of Engineering, Ahmedabad. (Gujarat), India – name: Professor, Department of Electronics and Communication L. D. College of Engineering, Ahmedabad. (Gujarat), India |
DBID | AAYXX CITATION |
DOI | 10.35940/ijitee.F8701.10101221 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2278-3075 |
EndPage | 35 |
ExternalDocumentID | 10_35940_ijitee_F8701_10101221 |
GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION M~E OK1 RNS |
ID | FETCH-LOGICAL-c1481-96ff09e3cf02f601f616474d1ccd8b45698cc0151c69fc5923c3a0340b743f9b3 |
ISSN | 2278-3075 |
IngestDate | Tue Jul 01 02:32:02 EDT 2025 Thu Apr 24 23:04:50 EDT 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 12 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c1481-96ff09e3cf02f601f616474d1ccd8b45698cc0151c69fc5923c3a0340b743f9b3 |
OpenAccessLink | https://doi.org/10.35940/ijitee.f8701.10101221 |
PageCount | 8 |
ParticipantIDs | crossref_citationtrail_10_35940_ijitee_F8701_10101221 crossref_primary_10_35940_ijitee_F8701_10101221 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-10-30 |
PublicationDateYYYYMMDD | 2021-10-30 |
PublicationDate_xml | – month: 10 year: 2021 text: 2021-10-30 day: 30 |
PublicationDecade | 2020 |
PublicationTitle | International journal of innovative technology and exploring engineering |
PublicationYear | 2021 |
SSID | ssj0001341869 |
Score | 2.165698 |
Snippet | Elliptic Curve Cryptography is gaining attraction in providing a high security level in data transmission with low cost, small key size and smaller hardware... |
SourceID | crossref |
SourceType | Enrichment Source Index Database |
StartPage | 28 |
Title | Analysis of Efficient Implementation of Elliptic Curve Cryptography Architecture for Resource Constraint Application |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2278-3075 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001341869 issn: 2278-3075 databaseCode: M~E dateStart: 20120101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT-MwELYKXJbDClhWsDzkA7cqJe_GR1RACFROsOIW1Y4tgpa2ilyk3cP-q_1_jMd5GFSxwCWqHHmaZD7Z8_I3hByFHHZBwZgXDtPCi6UIvEkkhTdkCY9U4WcTDOiPr9OL2_jyLrnr9f45VUsLzQfiz9JzJZ_RKoyBXs0p2Q9othUKA_Ab9AtX0DBc36Vjl1HkDLkgTGYfCX8f6zNFaA2awoy5YWYdLaon2R9Vv-e6pqrun7iZBFNz2AT0sZcndpDQ1lYVnRIfuvr3Lpz4goTC9lqFP9Nt7B7zFLKt-ZMdE2KXx9K2aOCqrErd_zlo4z_3Ewz_nFaD_ri8L6vmXh2vCLFgrk694LJmzt6aiJfNZcslY8267Lv4C91VNnP2a8t28noniBIWm9rJ8gE-oRycw7IUmEiFySQG3d7X5PtfbYltoSK4SCgpt3JylJM3clbIGkA8NY0zxn-d0B5YBhk2U2zfy55NR1HHSx_JMYsc--Zmg3ytHRN6YlG2SXpyukXWHbrKb0Q3eKMzRVu80Zd4w3s13ijijbp4oy7eKOCNNnijHd6og7dtcnt-djO68OquHZ4A1zrwWKqUz2QklB8qcPdVaijr4iIQosg42OssEwKM0ECkTIkEHAwRTfwo9jkYs4rx6DtZnc6mcodQlmTSdEAEs3QYi4LxMIBZQ8ZCFfOCF7skaT5aLmpKe_Ocv_K39bZLjtt5c0vq8p8ZPz48Y4986dC_T1Z1tZAHYL9qfohoeQYumZ6H |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Analysis+of+Efficient+Implementation+of+Elliptic+Curve+Cryptography+Architecture+for+Resource+Constraint+Application&rft.jtitle=International+journal+of+innovative+technology+and+exploring+engineering&rft.au=Patel%2C+Kirit+V.&rft.au=Shah%2C+Dr.+Mihir+V.&rft.date=2021-10-30&rft.issn=2278-3075&rft.eissn=2278-3075&rft.volume=10&rft.issue=12&rft.spage=28&rft.epage=35&rft_id=info:doi/10.35940%2Fijitee.F8701.10101221&rft.externalDBID=n%2Fa&rft.externalDocID=10_35940_ijitee_F8701_10101221 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2278-3075&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2278-3075&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2278-3075&client=summon |