Visible to the public An RNS Implementation of the Elliptic Curve Cryptography for IoT Security

TitleAn RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Publication TypeConference Paper
Year of Publication2019
AuthorsPandey, Jai Gopal, Mitharwal, Chhavi, Karmakar, Abhijit
Conference Name2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)
Date PublishedDec. 2019
PublisherIEEE
ISBN Number978-1-7281-6741-1
KeywordsC language, Ciphers, Communication systems, compute-intensive components, digital signature, digital signatures, ECC cipher, Elliptic curve cryptography, Elliptic curve cryptography (ECC), Elliptic curves, Hardware, Hardware software codesign, hardware-software codesign, hardware-software codesign implementation, Internet of Things, IoT security, IoT Security., Metrics, pubcrawl, public key cryptography, residue number system, residue number system (RNS), residue number systems, resilience, Resiliency, RNS implementation, Scalability, secure data transaction, Software, Virtex-5 xc5vfx70t device based platform, Xilinx platform studio tool
Abstract

Public key cryptography plays a vital role in many information and communication systems for secure data transaction, authentication, identification, digital signature, and key management purpose. Elliptic curve cryptography (ECC) is a widely used public key cryptographic algorithm. In this paper, we propose a hardware-software codesign implementation of the ECC cipher. The algorithm is modelled in C language. Compute-intensive components are identified for their efficient hardware implementations. In the implementation, residue number system (RNS) with projective coordinates are utilized for performing the required arithmetic operations. To manage the hardware-software codeign in an integrated fashion Xilinx platform studio tool and Virtex-5 xc5vfx70t device based platform is utilized. An application of the implementation is demonstrated for encryption of text and its respective decryption over prime fields. The design is useful for providing an adequate level of security for IoTs.

URLhttps://ieeexplore.ieee.org/document/9014356
DOI10.1109/TPS-ISA48467.2019.00017
Citation Keypandey_rns_2019