Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography

被引:0
|
作者
Menandas, Josepha J. [1 ]
Christo, Mary Subaja [1 ]
机构
[1] SRM Inst Sci & Technol, Dept Networking & Commun, Sch Comp, Chennai, India
关键词
Residue Number System; Elliptic Curve Cryptography; Scalar multiplication; Chinese Remainder Theorem; Modular reduction; Point Arithmetic; ALGORITHMS; ECC;
D O I
10.1109/ACCAI61061.2024.10602002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digitization is the term used to describe the current global technological migration from traditional to computational with the aid of IOT. Although the amount of data handled for daily applications is rapidly growing, security issues continue to be a top priority. The elliptic curve cryptography algorithm (ECC) is used in many security protocols for basic security features including digital signatures, authentication, and confidentiality. This technique helps shield data from side channel assaults. Scalar multiplication, which demands more time complexity and involves inverse operations, is essential to the execution of ECC. Here, we present a novel approach to efficiently implement scalar multiplication using the Residue Number System (RNS) with the Sum of Residues (SOR) parallel implementation in order to lower the time complexity of scalar multiplications by converting high-order curve points to low-order ones that have fewer inverse functions. Using point addition and doubling, this new approach is applied to two standard curves: the Edward curve (ED25519) and the Kobilitz curve (SECP256K1). The results demonstrate how well the RNS-based scalar multiplication implements the use of ECC.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Trading Inversions for Multiplications in Elliptic Curve Cryptography
    Mathieu Ciet
    Marc Joye
    Kristin Lauter
    Peter L. Montgomery
    Designs, Codes and Cryptography, 2006, 39 : 189 - 206
  • [2] Trading inversions for multiplications in elliptic curve cryptography
    Ciet, M
    Joye, M
    Lauter, K
    Montgomery, PL
    DESIGNS CODES AND CRYPTOGRAPHY, 2006, 39 (02) : 189 - 206
  • [3] On Elliptic Curve Cryptography implementations and evaluation
    Alimi, Nejmeddine
    Lahbib, Younes
    Machhout, Mohsen
    Tourki, Rached
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 35 - 40
  • [4] Studying software implementations of Elliptic Curve Cryptography
    Yan, Hai
    Shi, Zhijie Jerry
    THIRD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, PROCEEDINGS, 2006, : 78 - +
  • [5] Cost-Effective Implementations of GF (p) Elliptic Curve Cryptography Computations
    Khali, Hakim
    Farah, Ahcene
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (08): : 29 - 37
  • [6] Sole Inversion Precomputation for Elliptic Curve Scalar Multiplications
    Dahmen, Erik
    Okeya, Katsuyuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (06) : 1140 - 1147
  • [7] A multiple scalar multiplications algorithm in the elliptic curve cryptosystem
    Chen H.-Y.
    Ma C.-G.
    Ruan Jian Xue Bao/Journal of Software, 2011, 22 (04): : 782 - 788
  • [8] Overview of Scalar Multiplication in Elliptic Curve Cryptography
    Li, Ye
    Feng, Liu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2670 - 2673
  • [9] ELLIPTIC CURVE CRYPTOGRAPHY. JAVA']JAVA PLATFORM IMPLEMENTATIONS
    Gayoso Martinez, V.
    Hernandez Encinas, L.
    Sanchez Avila, C.
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2009, 1 (04): : 65 - 72
  • [10] A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over Fp
    Guillermin, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 48 - 64