An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Title | An RNS Implementation of the Elliptic Curve Cryptography for IoT Security |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Pandey, Jai Gopal, Mitharwal, Chhavi, Karmakar, Abhijit |
Conference Name | 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) |
Date Published | Dec. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6741-1 |
Keywords | C language, Ciphers, Communication systems, compute-intensive components, digital signature, digital signatures, ECC cipher, Elliptic curve cryptography, Elliptic curve cryptography (ECC), Elliptic curves, Hardware, Hardware software codesign, hardware-software codesign, hardware-software codesign implementation, Internet of Things, IoT security, IoT Security., Metrics, pubcrawl, public key cryptography, residue number system, residue number system (RNS), residue number systems, resilience, Resiliency, RNS implementation, Scalability, secure data transaction, Software, Virtex-5 xc5vfx70t device based platform, Xilinx platform studio tool |
Abstract | Public key cryptography plays a vital role in many information and communication systems for secure data transaction, authentication, identification, digital signature, and key management purpose. Elliptic curve cryptography (ECC) is a widely used public key cryptographic algorithm. In this paper, we propose a hardware-software codesign implementation of the ECC cipher. The algorithm is modelled in C language. Compute-intensive components are identified for their efficient hardware implementations. In the implementation, residue number system (RNS) with projective coordinates are utilized for performing the required arithmetic operations. To manage the hardware-software codeign in an integrated fashion Xilinx platform studio tool and Virtex-5 xc5vfx70t device based platform is utilized. An application of the implementation is demonstrated for encryption of text and its respective decryption over prime fields. The design is useful for providing an adequate level of security for IoTs. |
URL | https://ieeexplore.ieee.org/document/9014356 |
DOI | 10.1109/TPS-ISA48467.2019.00017 |
Citation Key | pandey_rns_2019 |
- IoT security
- Xilinx platform studio tool
- Virtex-5 xc5vfx70t device based platform
- Software
- secure data transaction
- Scalability
- RNS implementation
- Resiliency
- resilience
- residue number systems
- residue number system (RNS)
- residue number system
- public key cryptography
- pubcrawl
- Metrics
- IoT Security.
- C language
- Internet of Things
- hardware-software codesign implementation
- hardware-software codesign
- Hardware software codesign
- Hardware
- Elliptic curves
- Elliptic curve cryptography (ECC)
- Elliptic curve cryptography
- ECC cipher
- digital signatures
- digital signature
- compute-intensive components
- Communication Systems
- Ciphers