Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor
Pervasive networks with low-cost embedded 8-bit processors are set to change our day-to-day life. Public-key cryptography provides crucial functionality to assure security which is often an important requirement in pervasive applications. However, it has been the hardest to implement on constraint platforms due to its very high computational requirements. This contribution describes a proof-of-concept implementation for an extremely low-cost instruction set extension using reconfigurable logic, which enables an 8-bit micro-controller to provide full size elliptic curve cryptography (ECC) capabilities. Introducing full size public-key security mechanisms on such small embedded devices will allow new pervasive applications. We show that a standard compliant 163-bit point multiplication can be computed in 0.113 sec on an 8-bit AVR micro-controller running at 4 Mhz with minimal extra hardware, a typical representative for a low-cost pervasive processor. Our design not only accelerates the computation by a factor of more than 30 compared to a software-only solution, it also reduces the code-size, data-RAM and power requirements.
KeywordsElliptic Curve Elliptic Curf Elliptic Curve Cryptography Elliptic Curve Digital Signature Algorithm Pervasive Application
Unable to display preview. Download preview PDF.
- 1.ANSI X9.62-1999. The Elliptic Curve Digital Signature Algorithm. Technical report, ANSI (1999)Google Scholar
- 2.Bailey, D.V., Paar, C.: Optimal Extension Fields for Fast Arithmetic in Public- Key Algorithms. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 472–485. Springer, Heidelberg (1998)Google Scholar
- 4.Brown, M., Cheung, D., Hankerson, D., Hernandez, J.L., Kirkup, M., Menezes, A.: PGP in Constrained Wireless Devices. In: Proceedings of the 9th USENIX Security Symposium (August 2000)Google Scholar
- 11.IEEE. Standard Specifications for Public-Key Cryptography (2000)Google Scholar
- 12.ISO/IEC. Information technology – Security techniques – Cryptographic techniques based on elliptic curves (2002)Google Scholar
- 13.Janssens, S., Thomas, J., Borremans, W., Gijsels, P., Verhauwhede, I., Vercauteren, F., Preneel, B., Vandewalle, J.: Hardware/software co-design of an elliptic curve public-key cryptosystem (2001)Google Scholar
- 15.Kumar, S., Girimondo, M., Weimerskirch, A., Paar, C., Patel, A., Wander, A.S.: Embedded End-to-End Wireless Security with ECDH Key Exchange. In: Proceedings of the 46th IEEE International Midwest Symposium on Circuits and Systems — MWSCAS 2003 (December 2003)Google Scholar
- 17.Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)Google Scholar
- 18.NIST. Recommended Elliptic Curves for Federal Government Use (May 1999)Google Scholar
- 19.Schroeppel, R., Orman, H., O’Malley, S., Spatscheck, O.: Fast key exchange with elliptic curve systems. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 43–56. Springer, Heidelberg (1995)Google Scholar
- 22.Woodbury, A., Bailey, D.V., Paar, C.: Elliptic curve cryptography on smart cards without coprocessors. In: CARDIS 2000, Bristol, UK, September 20–22, Kluwer, Dordrecht (2000)Google Scholar