Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography

被引:0
|
作者
Menandas, Josepha J. [1 ]
Christo, Mary Subaja [1 ]
机构
[1] SRM Inst Sci & Technol, Dept Networking & Commun, Sch Comp, Chennai, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Residue Number System; Elliptic Curve Cryptography; Scalar multiplication; Chinese Remainder Theorem; Modular reduction; Point Arithmetic; ALGORITHMS; ECC;
D O I
10.1109/ACCAI61061.2024.10602002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digitization is the term used to describe the current global technological migration from traditional to computational with the aid of IOT. Although the amount of data handled for daily applications is rapidly growing, security issues continue to be a top priority. The elliptic curve cryptography algorithm (ECC) is used in many security protocols for basic security features including digital signatures, authentication, and confidentiality. This technique helps shield data from side channel assaults. Scalar multiplication, which demands more time complexity and involves inverse operations, is essential to the execution of ECC. Here, we present a novel approach to efficiently implement scalar multiplication using the Residue Number System (RNS) with the Sum of Residues (SOR) parallel implementation in order to lower the time complexity of scalar multiplications by converting high-order curve points to low-order ones that have fewer inverse functions. Using point addition and doubling, this new approach is applied to two standard curves: the Edward curve (ED25519) and the Kobilitz curve (SECP256K1). The results demonstrate how well the RNS-based scalar multiplication implements the use of ECC.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] The State of Elliptic Curve Cryptography
    Neal Koblitz
    Alfred Menezes
    Scott Vanstone
    Designs, Codes and Cryptography, 2000, 19 : 173 - 193
  • [32] Elliptic-curve cryptography
    Fernandes, AD
    DR DOBBS JOURNAL, 1999, 24 (12): : 56 - +
  • [33] A SURVEY OF ELLIPTIC CURVE CRYPTOGRAPHY
    Aydin, M. Ali
    Aydin, G. Zeynep
    ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2006, 6 (02): : 211 - 221
  • [34] A survey of elliptic curve cryptography
    Istanbul University, Engineering Faculty, Computer Engineering Dept., 34320 Avcilar, Istanbul, Turkey
    Istanb. Univ. J. Electr. Electron. Eng., 2006, 2 (211-221):
  • [35] Research on elliptic curve cryptography
    Qiu, QZ
    Xiong, QX
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, VOL 2, 2004, : 698 - 701
  • [36] Investigation into the Elliptic Curve Cryptography
    Fang, Xianjin
    Wu, Yanting
    2017 3RD INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2017), 2017, : 412 - 415
  • [37] Fast elliptic curve multiplications with SIMD operations
    Izu, T
    Takagi, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (01) : 85 - 93
  • [38] Elliptic curve cryptography engineering
    Cilardo, A
    Coppolino, L
    Mazzocca, N
    Romano, L
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 395 - 406
  • [39] Fast elliptic curve multiplications with SIMD operations
    Izu, T
    Takagi, T
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 217 - 230
  • [40] Safe and Effective Elliptic Curve Cryptography Algorithm against Energy Attack
    Yao, Jianbo
    Yang, Chaoqiong
    Zhang, Tao
    2022 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, BIG DATA AND ALGORITHMS (EEBDA), 2022, : 1313 - 1316