Advertisement

Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes

  • Leif Uhsadel
  • Axel Poschmann
  • Christof Paar
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4572)

Abstract

In this article we present the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro controller which are typically used in WSNs. The major part (77%) of the processing time for an elliptic curve operation such as ECDSA or EC Diffie-Hellman is spent on modular multiplication. We present an optimized arithmetic algorithm which significantly speed up ECC schemes. The reduced processing time also yields a significantly lower energy consumption of ECC schemes. With our implementation results we can show that a 160-bit modular multiplication can be performed in 0.39 ms on an 8-bit AVR processor clocked at 7.37 MHz. This brings the vision of asymmetric cryptography in the field of WSNs with all its benefits for key-distribution and authentication a step closer to reality.

Keywords

wireless sensor network elliptic curve cryptography 8-bit micro controller Micaz secp160r1 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Atmel. 8-bit Microcontroller with 128K Bytes In-System Programmable Flash, http://www.atmel.com/
  2. Brown, M., Hankerson, D., López, J., Menezes, A.: Software Implementation of the NIST Elliptic Curves Over Prime Fields. In: Naccache, D. (ed.) Topics in Cryptology - CT-RSA 2001. LNCS, vol. 2020, p. 250. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. Certicom Research. SEC 2: Recommended Elliptic Curve Domain Parameters. Standards for Efficient Cryptography Version 1.0 (September 2000)Google Scholar
  4. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proceedings of the IEEE Security and Privacy Symposium 2003 (2003)Google Scholar
  5. Du, W., Deng, J., Han, Y., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: CCS 2003: Proceedings of the 10th ACM Conference on Computer and Communications SecurityGoogle Scholar
  6. Eschenauer, L., Gligor, V.: A Key Management Scheme for Distributed Sensor Networks. In: CCS 2002. Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM Press, New York (2002)Google Scholar
  7. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)Google Scholar
  8. Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)zbMATHGoogle Scholar
  9. Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System Architecture Directions for Networked Sensors. SIGOPS Oper. Syst. Rev. 34(5), 93–104 (2000)CrossRefGoogle Scholar
  10. Hill, J.L., Culler, D.: Mica: a Wireless Platform for Deeply Embedded Networks. Micro, IEEE 22(6), 12–24 (2002)CrossRefGoogle Scholar
  11. Liu, A., Ning, P.: TinyECC: Elliptic Curve Cryptography for Sensor Networks. available for download at (September 2006), http://discovery.csc.ncsu.edu/software/TinyECC
  12. Menezes, A.J., Van, O., Paul, C., Vanstone, S.A. (eds.): Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (1996)Google Scholar
  13. Certicom Research. SEC 1: Elliptic Curve Cryptography, Version 1.0 (September 2000)Google Scholar
  14. Solinas, J.: Generalized Mersenne Numbers. Technical report CORR-39, Dept. of C&O, University of Waterloo (1999), available from http://www.cacr.math.uwaterloo.ca
  15. Watro, R., Kong, D., Cuti, S.F., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing Sensor Networks with Public Key Technology. In: SASN 2004. Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 59–64. ACM Press, New York (2004)CrossRefGoogle Scholar
  16. Crossbow Technology, Inc., http://www.xbow.com

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Leif Uhsadel
    • 1
  • Axel Poschmann
    • 1
  • Christof Paar
    • 1
  1. 1.Horst Görtz Institute for IT Security, Communication Security Group (COSY), Ruhr-Universität Bochum, Germany, Universitätsstrasse 150, 44780 BochumGermany

Personalised recommendations