Light Weight Cryptography and Applications

  • Sandeep Sadanandan
  • Rajyalakshmi Mahalingam

Abstract

Portable handheld devices are emerging as strong competitors to large traditional electronic devices requiring advanced safety and security mechanisms. Lightweight cryptography is developing as an attractive public-key cryptosystem for use with many such devices, particularly when the devices are not capable of performing sufficient cryptographic operations to guarantee adequate security. The paper provides a survey, how Elliptic Curve Cryptography as a light weight security solution, is accommodating the limitations of resource constrained environments of a whole lot of new generation applications.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Elliptic curve cryptosystems.Koblitz, Neil. 1987, Mathematics of Computation, Vol. 48, pp. 203-209.Google Scholar
  2. [2]
    A Normal Form for Elliptic Curves.Edwards, Harold M. 2007, Bull. American Mathematical Society, Vol. 44, pp. 393-422.Google Scholar
  3. [3]
    Hyperelliptic cryptosystems.Koblitz, Neil. 1989, Journal of Cryptology, Vol. 1, pp. 139-150.Google Scholar
  4. [4]
    Computing in Jacobian of a Hyperelliptic Curve.Cantor, D. 177, January 1987, Math. Computation, Vol. 48, pp. 95-101.Google Scholar
  5. [5]
    Gaudry, Pierrick. Genus 2 formulae based on Theta functions and their implementation. 11th Workshop on Elliptic Curve Cryptography.[Online] September 5, 2007. http:/ / mathsci.ucd.ie/ ~gmg/ ECC2007Talks/ ecc07-gaudry2.pdf.Google Scholar
  6. [6]
    National Institute of Standards and Technology. Digital Signature Standard. U.S. DEPARTMENT OF COMMERCE/ National Institute of Standards and Technology.Google Scholar
  7. [7]
    Certicom. Certicom ECC Certificate Utility datasheet. Certicom : Encryption and Security Document Library.[Online] http:/ / certicom.ca/ download/ aid-626/ certutility_datasheet.pdf.Google Scholar
  8. [8]
    Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs - CHES 2004.Gura, Nils, et al. Cambridge, MA, USA : Springer, 2004. Lecture Notes in Computer Science. Vol. 3156, pp. 119-132. CHES 2k4.Google Scholar
  9. [9]
    Lopez, J and Dahab, R. Performace of Elliptic Curve Cryptosystems.2000. Technical.Google Scholar
  10. [10]
    Kumar, Sandeep and Paar, C. Are Standards Compliant Elliptic Curve Cryptosystems feasible on RFID. Wokshop On RFID Security.Graz, Austria : s.n., July 2006.Google Scholar
  11. [11]
    PRESENT: An Ultra-Lightweight Block Cipher.Bogdanov, A., et al. s.l. : Springer Verlag Heidelberg Berlin, 2007. Cryptographic Hardware and Embedded Systems - CHES 2007. Vol. 4727, pp. 450-466. Lecture Notes in Computer Science.Google Scholar
  12. [12]
    Tuyls, P. and Batina, L. RFID Tags for Anti-Counterfeiting. [ed.] In D. Pointcheval. Lecture Notes in Computer Science.February 2006.Google Scholar
  13. [13]
    Wolkerstofer, J. Is Elliptic Curve Cryptography Suitable toSecure RFID Tags? Workshop on RFID and Lightweight Crypto.Graz, Austria : s.n., July 14, 2005.Google Scholar
  14. [14]
    National Security Agency, USA. The Case for Elliptic Curve Cryptography. National Security Agency, USA.[Online] http:/ / www.nsa.gov/ ia/ industry/ crypto_elliptic_curve.cfm.Google Scholar
  15. [15]
    Pelzl, Jan, et al. Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update. Cryptology ePrint Archive.[http:/ / eprint.iacr.org/ ]. March 2003.Google Scholar
  16. [16]
    Bernstein, Daniel J. Elliptic vs. hyperelliptic, part 1. cr.yp.to.[Online] September 20, 1006. http:/ / cr.yp.to/ talks/ 2006.09.20/ slides.pdf.Google Scholar
  17. [17]
    Bernstein, Daniel J.Elliptic vs. hyperelliptic, part 3 : Elliptic strikes back. cr.yp.to.[Online] May 22, 2007. http:/ / cr.yp.to/ talks/ 2007.05.22/ slides.pdf.Google Scholar
  18. [18]
    National Security Agency, USA. Fact Sheet NSA Suite B Cryptography. National Security Agency, USA.[Online] http:/ / www.nsa.gov/ ia/ industry/ crypto_suite_b.cfm.Google Scholar
  19. [19]
    Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.Gura, Nils, et al. s.l. : Springer Verlag Heidelberg Berlin, 2004. Cryptographic Hardware and Embedded Systems - CHES 2007. Vol. 3156, pp. 119-132.Google Scholar
  20. [20]
    Batina, L., et al. An Elliptic Curve Processor Suitable For RFID-Tags. Cryptology ePrint Archive.2006. http://eprint.iacr.org/.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2008

Authors and Affiliations

  • Sandeep Sadanandan
    • 1
  • Rajyalakshmi Mahalingam
    • 2
  1. 1.Department of Computer ScienceTechnical University MunichMunichGermany
  2. 2.Technical University MunichMunichGermany

Personalised recommendations