2021
DOI: 10.3390/en14154676
|View full text |Cite
|
Sign up to set email alerts
|

Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications

Abstract: Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed. Elliptic Curve Cryptography (ECC) is largely adopted in an IoT context to provide security services such as key-exchange and digital signature. For Real-Time IoT applications, hardware acceleration for ECC-based algorithms can be mandatory to meet low-latency and low-power/energy … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(29 citation statements)
references
References 26 publications
(40 reference statements)
0
29
0
Order By: Relevance
“…On the other hand, the computation latency of the right-to-left binary method does not increase since it allows the cryptosystem to perform PA and PD operations simultaneously. Nevertheless, in a recent related study, Di Matteo et al [25] proposed that the double-and-add always right-to-left method is not entirely resistant to SPA because the presence between actual points and the infinity point of operations allows an attacker to decode part of the secret key k. Di Matteo proposed a modified version of the double-and-add always right-to-left method to address this vulnerability, which implements countermeasures against SPA by avoiding any point operation with an infinity point.…”
Section: Methods and Side-channel Attacksmentioning
confidence: 91%
See 1 more Smart Citation
“…On the other hand, the computation latency of the right-to-left binary method does not increase since it allows the cryptosystem to perform PA and PD operations simultaneously. Nevertheless, in a recent related study, Di Matteo et al [25] proposed that the double-and-add always right-to-left method is not entirely resistant to SPA because the presence between actual points and the infinity point of operations allows an attacker to decode part of the secret key k. Di Matteo proposed a modified version of the double-and-add always right-to-left method to address this vulnerability, which implements countermeasures against SPA by avoiding any point operation with an infinity point.…”
Section: Methods and Side-channel Attacksmentioning
confidence: 91%
“…In [8], an FPGA-based ECC processor architecture for IoT applications combines various lightweight modular methods and a classic binary ECSM method to achieve the trade-offs between speed and area. In 2021, Di Matteo improved the double-and-add always method and proposed a higher security ECC processor for IoT applications [25].…”
Section: Introductionmentioning
confidence: 99%
“…In both prime fields GF p ð Þ and binary extension fields GF 2 n ð Þ, there is a large amount of work on finite field multiplication. Much of the reported multipliers exhibited large space and delay complexity, making them impractical for IoT edge devices with limited resources [13][14][15][16]. Numerous publications suggested word-serial finite field multipliers to overcome these constraints.…”
Section: Related Workmentioning
confidence: 99%
“…In 2010 and 2016, China successively released the ECC-based SM2 Elliptic Curve Public Key Cryptography Algorithm and SM9 Identification Cryptography Algorithm [3] . The whole protocol and process of data encryption and decryption in both SM2 and SM9 cryptographic algorithms are inseparable from the support of underlying modular operations, especially the modular inversion operation with the largest amount of computation and the longest time consumption [4] , which is the key to affect the execution efficiency of the entire cryptographic algorithm [5] . Rahman et al [1] used Jacobian coordinate transformation to compress the number of modular inversions required for point operations in ECC, but still could not avoid modular inversions.…”
Section: Introductionmentioning
confidence: 99%