Skip to main content

An Efficient Cryptographic Accelerators for IoT System Based on Elliptic Curve Digital Signature

  • Conference paper
  • First Online:
Intelligent Systems and Data Science (ISDS 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1950))

Included in the following conference series:

  • 262 Accesses

Abstract

Given the importance of security requirements in today’s Internet of Things (IoT) landscape, this study focuses on enhancing the security of IoT systems through encryption algorithms implemented on the SoC-FPGA platform. Specifically, this paper presents the development of a hardware system that generates public keys and performs digital signature generation and verification using the Elliptic Curve Digital Signature Algorithm (ECDSA) based on the SECP256K1 curve. The ECDSA encryption hardware functions as a co-processor and demonstrates a maximum operating frequency of 30 MHz. In terms of performance, the ECDSA IP achieves efficient processing speeds, taking approximately 17 ms to generate a public key and produce a digital signature and nearly 30 ms to verify the digital signature. These results showcase a well-balanced design that enables a trade-off between speed, area, and power dissipation in the proposed system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Olazabal, O., et al.: Multimodal biometrics for enhanced IoT security. In: Proceedings of IEEE Annual Computing and Communication Workshop and Conference (CCWC), pp. 0886–0893, January 2019

    Google Scholar 

  2. Shrivastava, A., Haripriya, D., Borole, Y.D., Nanoty, A., Singh, C., Chauhan, D.: High performance FPGA based secured hardware model for IoT devices. Int. J. Syst. Assur. Eng. Manag. 13, 736–741 (2022)

    Google Scholar 

  3. Aras, E., Delbruel, S., Yang, F., Joosen, W., Hughes, D.: Chimera: a low-power reconfigurable platform for internet of things. ACM Trans. Internet Things 2(2), 1–25 (2021)

    Article  Google Scholar 

  4. Shah, Y.A., Javeed, K., Azmat, S., Wang, X.: A high-speed RSD-based flexible ECC processor for arbitrary curves over general prime field. Int. J. Circ. Theory Appl. 46(10), 1858–1878 (2018)

    Google Scholar 

  5. Järvinen, K.: Optimized FPGA-based elliptic curve cryptography processor for high-speed applications. Integration 44(4), 270–279 (2011)

    Article  Google Scholar 

  6. Sandoval, M.M., Flores, L.A.R., Cumplido, R., Hernandez, J.J.G., Feregrino, C., Algredo, I.: A compact FPGA-based accelerator for curve-based cryptography in wireless sensor networks. J. Sens. 2021, 1–13 (2021)

    Google Scholar 

  7. Imran, M., Rashid, M., Jafri, A.R., Kashif, M.: Throughput/Area optimised pipelined architecture for elliptic curve crypto processor. IET Comput. Digit. Tech. 13(5), 361–368 (2019)

    Article  Google Scholar 

  8. Tanaka, K., Miyaji, A., Jin, Y.: Efficient FPGA design of exception-free generic elliptic curve cryptosystems. In: Proceedings of Applied Cryptography and Network Security (ACNS), pp. 393–414, June 2021

    Google Scholar 

  9. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_31

    Chapter  Google Scholar 

  10. Brown, D.R.L.: SEC 2: recommended elliptic curve domain parameters. Standards for Efficient Cryptography, pp. 1–37, January 2010. https://www.secg.org/sec2-v2.pdf

  11. IEEE: IEEE Standard Specifications for Public-Key Cryptography. IEEE Std 1363-2000, pp. 1–228, August 2000

    Google Scholar 

  12. Barrett, P.: Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311–323. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_24

    Chapter  Google Scholar 

  13. Finite field arithmetic. In: Guide to Elliptic Curve Cryptography, pp. 25–73. Springer, New York (2004). https://doi.org/10.1007/0-387-21846-7_2

  14. Liu, Z., Seo, H., Großschädl, J., Kim, H.: Efficient implementation of NIST-compliant elliptic curve cryptography for 8-bit AVR-based sensor nodes. IEEE Trans. Info. Forensics Secur. 11(7), 1385–1397 (2016)

    Google Scholar 

  15. Gouvêa, C.P.L., Oliveira, L.B., López, J.: Efficient software implementation of public-key cryptography on sensor networks using the MSP430X microcontroller. J. Crypto. Engi. 2, 19–29 (2012)

    Article  Google Scholar 

  16. Glas, B., Sander, O., Stuckert, V., Müller-Glaser, K.D., Becker, J.: Prime field ECDSA signature processing for reconfigurable embedded systems. Int. J. Reconfig. Comp. 2011, 1–12 (2011)

    Google Scholar 

  17. Ikeda, M.: Hardware acceleration of elliptic-curve based crypto-algorithm, ECDSA and pairing engines. In: Proceedings of IEEE International Conference on ASIC (ASICON), pp. 1–4, October 2021

    Google Scholar 

Download references

Acknowledgment

This research is funded by University of Science, VNU-HCM under grant number ĐTVT 2022-04.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tuan-Kiet Tran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huynh, HT., Dang, TP., Hoang, TT., Pham, CK., Tran, TK. (2024). An Efficient Cryptographic Accelerators for IoT System Based on Elliptic Curve Digital Signature. In: Thai-Nghe, N., Do, TN., Haddawy, P. (eds) Intelligent Systems and Data Science. ISDS 2023. Communications in Computer and Information Science, vol 1950. Springer, Singapore. https://doi.org/10.1007/978-981-99-7666-9_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-7666-9_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-7665-2

  • Online ISBN: 978-981-99-7666-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics