Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography

被引:0
|
作者
Menandas, Josepha J. [1 ]
Christo, Mary Subaja [1 ]
机构
[1] SRM Inst Sci & Technol, Dept Networking & Commun, Sch Comp, Chennai, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Residue Number System; Elliptic Curve Cryptography; Scalar multiplication; Chinese Remainder Theorem; Modular reduction; Point Arithmetic; ALGORITHMS; ECC;
D O I
10.1109/ACCAI61061.2024.10602002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digitization is the term used to describe the current global technological migration from traditional to computational with the aid of IOT. Although the amount of data handled for daily applications is rapidly growing, security issues continue to be a top priority. The elliptic curve cryptography algorithm (ECC) is used in many security protocols for basic security features including digital signatures, authentication, and confidentiality. This technique helps shield data from side channel assaults. Scalar multiplication, which demands more time complexity and involves inverse operations, is essential to the execution of ECC. Here, we present a novel approach to efficiently implement scalar multiplication using the Residue Number System (RNS) with the Sum of Residues (SOR) parallel implementation in order to lower the time complexity of scalar multiplications by converting high-order curve points to low-order ones that have fewer inverse functions. Using point addition and doubling, this new approach is applied to two standard curves: the Edward curve (ED25519) and the Kobilitz curve (SECP256K1). The results demonstrate how well the RNS-based scalar multiplication implements the use of ECC.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] A Systematic Review of Fast, Scalable, and Efficient Hardware Implementations of Elliptic Curve Cryptography for Blockchain
    Ifrim, Rares
    Loghin, Dumitrel
    Popescu, Decebal
    ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2024, 17 (04)
  • [22] Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography
    Ning, Yan-Duan
    Chen, Yan-Haw
    Shih, Cheng-Sin
    Chu, Shao-, I
    CRYPTOGRAPHY, 2024, 8 (01)
  • [23] Optimization algorithm for scalar multiplication in the elliptic curve cryptography over prime field
    Hao, Yuanling
    Ma, Shiwei
    Chen, Guanghua
    Zhang, Xiaoli
    Chen, Hui
    Zeng, Weimin
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2008, 5226 : 904 - +
  • [24] Radix-2w Arithmetic for Scalar Multiplication in Elliptic Curve Cryptography
    Oudjida, Abdelkrim Kamel
    Liacha, Ahmed
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2021, 68 (05) : 1979 - 1989
  • [25] Faster Scalar Multiplication Algorithm to Implement a Secured Elliptic Curve Cryptography System
    Akhter, Fatema
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 639 - 644
  • [26] Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations
    Mahdavi, Roghaie
    Saiadian, Abolghasem
    CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 184 - 198
  • [27] Fast Scalar Multiplications on Hyperelliptic Curve Cryptosystems
    You, Lin
    Zeng, Jiwen
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2010, 34 (02): : 227 - 236
  • [28] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
  • [29] Elliptic Curve Cryptography on PocketPCs
    Edoh, Kossi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (03): : 23 - 33
  • [30] Elliptic Curve Cryptography in Practice
    Bos, Joppe W.
    Halderman, J. Alex
    Heninger, Nadia
    Moore, Jonathan
    Naehrig, Michael
    Wustrow, Eric
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 157 - 175