Light Weight Cryptography and Applications

  • Sandeep Sadanandan
  • Rajyalakshmi Mahalingam

Abstract

Portable handheld devices are emerging as strong competitors to large traditional electronic devices requiring advanced safety and security mechanisms. Lightweight cryptography is developing as an attractive public-key cryptosystem for use with many such devices, particularly when the devices are not capable of performing sufficient cryptographic operations to guarantee adequate security. The paper provides a survey, how Elliptic Curve Cryptography as a light weight security solution, is accommodating the limitations of resource constrained environments of a whole lot of new generation applications.

Keywords

Elliptic Curve Elliptic Curf Hyperelliptic Curve Elliptic Curve Cryptography Discrete Logarithm Problem 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Elliptic curve cryptosystems.Koblitz, Neil. 1987, Mathematics of Computation, Vol. 48, pp. 203-209.Google Scholar
  2. [2]
    A Normal Form for Elliptic Curves.Edwards, Harold M. 2007, Bull. American Mathematical Society, Vol. 44, pp. 393-422.Google Scholar
  3. [3]
    Hyperelliptic cryptosystems.Koblitz, Neil. 1989, Journal of Cryptology, Vol. 1, pp. 139-150.Google Scholar
  4. [4]
    Computing in Jacobian of a Hyperelliptic Curve.Cantor, D. 177, January 1987, Math. Computation, Vol. 48, pp. 95-101.Google Scholar
  5. [5]
    Gaudry, Pierrick. Genus 2 formulae based on Theta functions and their implementation. 11th Workshop on Elliptic Curve Cryptography.[Online] September 5, 2007. http:/ / mathsci.ucd.ie/ ~gmg/ ECC2007Talks/ ecc07-gaudry2.pdf.Google Scholar
  6. [6]
    National Institute of Standards and Technology. Digital Signature Standard. U.S. DEPARTMENT OF COMMERCE/ National Institute of Standards and Technology.Google Scholar
  7. [7]
    Certicom. Certicom ECC Certificate Utility datasheet. Certicom : Encryption and Security Document Library.[Online] http:/ / certicom.ca/ download/ aid-626/ certutility_datasheet.pdf.Google Scholar
  8. [8]
    Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs - CHES 2004.Gura, Nils, et al. Cambridge, MA, USA : Springer, 2004. Lecture Notes in Computer Science. Vol. 3156, pp. 119-132. CHES 2k4.Google Scholar
  9. [9]
    Lopez, J and Dahab, R. Performace of Elliptic Curve Cryptosystems.2000. Technical.Google Scholar
  10. [10]
    Kumar, Sandeep and Paar, C. Are Standards Compliant Elliptic Curve Cryptosystems feasible on RFID. Wokshop On RFID Security.Graz, Austria : s.n., July 2006.Google Scholar
  11. [11]
    PRESENT: An Ultra-Lightweight Block Cipher.Bogdanov, A., et al. s.l. : Springer Verlag Heidelberg Berlin, 2007. Cryptographic Hardware and Embedded Systems - CHES 2007. Vol. 4727, pp. 450-466. Lecture Notes in Computer Science.Google Scholar
  12. [12]
    Tuyls, P. and Batina, L. RFID Tags for Anti-Counterfeiting. [ed.] In D. Pointcheval. Lecture Notes in Computer Science.February 2006.Google Scholar
  13. [13]
    Wolkerstofer, J. Is Elliptic Curve Cryptography Suitable toSecure RFID Tags? Workshop on RFID and Lightweight Crypto.Graz, Austria : s.n., July 14, 2005.Google Scholar
  14. [14]
    National Security Agency, USA. The Case for Elliptic Curve Cryptography. National Security Agency, USA.[Online] http:/ / www.nsa.gov/ ia/ industry/ crypto_elliptic_curve.cfm.Google Scholar
  15. [15]
    Pelzl, Jan, et al. Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update. Cryptology ePrint Archive.[http:/ / eprint.iacr.org/ ]. March 2003.Google Scholar
  16. [16]
    Bernstein, Daniel J. Elliptic vs. hyperelliptic, part 1. cr.yp.to.[Online] September 20, 1006. http:/ / cr.yp.to/ talks/ 2006.09.20/ slides.pdf.Google Scholar
  17. [17]
    Bernstein, Daniel J.Elliptic vs. hyperelliptic, part 3 : Elliptic strikes back. cr.yp.to.[Online] May 22, 2007. http:/ / cr.yp.to/ talks/ 2007.05.22/ slides.pdf.Google Scholar
  18. [18]
    National Security Agency, USA. Fact Sheet NSA Suite B Cryptography. National Security Agency, USA.[Online] http:/ / www.nsa.gov/ ia/ industry/ crypto_suite_b.cfm.Google Scholar
  19. [19]
    Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.Gura, Nils, et al. s.l. : Springer Verlag Heidelberg Berlin, 2004. Cryptographic Hardware and Embedded Systems - CHES 2007. Vol. 3156, pp. 119-132.Google Scholar
  20. [20]
    Batina, L., et al. An Elliptic Curve Processor Suitable For RFID-Tags. Cryptology ePrint Archive.2006. http://eprint.iacr.org/.Google Scholar

Copyright information

© Springer Science+Business Media B.V. 2008

Authors and Affiliations

  • Sandeep Sadanandan
    • 1
  • Rajyalakshmi Mahalingam
    • 2
  1. 1.Department of Computer ScienceTechnical University MunichMunichGermany
  2. 2.Technical University MunichMunichGermany

Personalised recommendations