Abstract
This contribution describes a methodology used to efficiently implement elliptic curves (EC) over GF(p) on the 16-bit TI MSP430x33x family of low-cost microcontrollers. We show that it is possible to implement EC cryptosystems in highly constrained embedded systems and still obtain acceptable performance at low cost. We modified the EC point addition and doublingform ulae to reduce the number of intermediate variables while at the same time allowingfor flexibility. We used a Generalized-Mersenne prime to implement the arithmetic in the underlying field. We take advantage of the special form of the moduli to minimize the number of precomputations needed to implement inversion via Fermat's Little theorem and the k-ary method of exponentiation. We apply these ideas to an implementation of an elliptic curve system over GF(p), where p = 2128. 297. 1. We show that a scalar point multiplication can be achieved in 3.4 seconds without any stored/precomputed values and the processor clocked at 1 MHz.
Part of this work was performed while the author was at cv cryptovision gmbh.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
ANSI X9.62-1-xxxx. Public Key Cryptography for the Financial Services Industry: the Ellip tic Curve Digital Signature Algorithm (ECDSA) (Revised). Technical report, American Bankers Association, October 1999.
ANSI X9.62-1999. The Elliptic Curve Digital Signature Algorithm. Technical report, ANSI, 1999.
D. V. Bailey and C. Paar. Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms. In H. Krawczyk, editor, Advances in Cryptology-CRYPTO’ 98, volume LNCS 1462, pages 472–485, Berlin, Germany, 1998. Springer-Verlag.
D. V. Bailey and C. Paar. Inversion in Optimal Extension Fields. In A. Odlyzko, G. Walsh, and H. Williams, editors, Conference on The Mathematics of Public Key Cryptography, The Fields Institute for Research in the Mathematical Sciences, Toronto, Canada, June 1999.
P. Barrett. Implementingthe Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor. In A. M. Odlyzko, editor,Advances in Cryptology-CRYPTO’ 86, volume LNCS 263, pages 311–323, Berlin, Germany, August 1986. Springer-Verlag.
G. Borriello and R. Want. Embedded computation meets the world wide web. Communications of the ACM, 43(5):59–66, May 2000.
Ç. K. KoÇ, T. Acar, and B. Kaliski. Analyzingand ComparingMon tgomery Multiplication Algorithms. IEEE Micro, pages 26–33, June 1996.
D.V. Chudnovsky and G.V. Chudnovsky. Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Advances in Applied Mathematics, 7:385–434, 1986.
Jae Wook Chung, Sang Gyoo Sim, and Pil Joong Lee. Fast Implementation of Elliptic Curve Defined over GF(p m) on CalmRISC with MAC2424 Coprocessor. In eÇetin K. KoÇ and Christof Paar, editors, Workshop on Cryptographic Hardware and Embedded Systems-CHES 2000, pages 57–70, Berlin, 2000. Springer-Verlag.
Henry Cohen, Atsuko Miyaji, and Takatoshi Ono. Efficient Elliptic Curve Exponentiation UsingMixed Coordinates. In Kazuo Ohta and Dingyi Pei, editors, Advances in Cryptology-ASIACRYPT’98, volume LNCS 1514, pages 51–65, Berlin, 1998. Springer-Verlag.
S. R. Dussé and B. S. Kaliski. A Cryptographic Library for the Motorola DSP56000. In I. B. Damgård, editor, Advances in Cryptology-EUROCRYPT’ 90, volume LNCS 473, pages 230–244, Berlin, Germany, May 1990. Springer-Verlag.
D. Estrin, R. Govindan, and J. Heidemann. Embeddingthe Internet. Communications of the ACM, 43(5):39–41, May 2000.
D. M. Gordon. A survey of fast exponentiation methods. Journal of Algorithms, 27:129–146, 1998.
J. Guajardo and C. Paar. Efficient Algorithms for Elliptic Curve Cryptosystems. In B. Kaliski, editor, Advances in Cryptology-CRYPTO’ 97, volume LNCS 1294, pages 342–356, Berlin, Germany, August 1997. Springer-Verlag.
R. Harley, D. Doligez, D. de Rauglaudre, and X. Leroy. http://cristal.inria.fr/%7Eharley/ecdl7/.
Toshio Hasegawa, Junko Nakajima, and Mitsuru Matsui. A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. In Hideki Imai and Yuliang Zheng, editors, First International Workshop on Practice and Theory in Public Key Cryptography-PKC’98, volume LNCS 1431, pages 182–194, Berlin, 1998. Springer-Verlag.
K. Itoh, M. Takenaka, N. Torii, S. Temma, and Y. Kurihara. Fast Implemenation of Public-Key Cryptography on a DSP TMS320C6201. In Çetin K. KoÇ and Christof Paar, editors, Proceedings of the First Workshop on Cryptographic Hardware and Embedded Systems-CHES’99, volume LNCS 1717, pages 61–72, Berlin, Germany, August 1999. Springer-Verlag.
T. Itoh and S. Tsujii. A fast algorithm for computing multiplicative inverses in GF(2m) usingnormal bases. Information and Computation, 78:171–177, 1988.
D. E. Knuth. The Art of Computer Programming. Volume 2: Seminumerical Algorithms. Addison-Wesley, Reading, Massachusetts, USA, 2nd edition, 1981.
N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203–209, 1987.
Arjen Lenstra and Eric Verheul. Selectingcryptog raphic key sizes. In Hideki Imai and Yuliang Zheng, editors, Third International Workshop on Practice and Theory in Public Key Cryptography-PKC 2000, volume LNCS 1751, Berlin, 2000. Springer-Verlag.
Chae Hoon Lim and Hyo Sun Hwang. Fast Implementation of Elliptic Curve Arithmetic in GF(pn). In Hideki Imai and Yuliang Zheng, editors, Third International Workshop on Practice and Theory in Public Key Cryptography-PKC 2000, volume LNCS 1751, pages 405–421, Berlin, 2000. Springer-Verlag.
A. J. Menezes. Elliptic Curve Public Key Cryptosystems. Kluwer Academic Publishers, Boston, Massachusetts, USA, 1993.
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, Florida, USA, 1997.
V. Miller. Uses of elliptic curves in cryptography. In H. C. Williams, editor, Advances in Cryptology-CRYPTO’ 85, volume LNCS 218, pages 417–426, Berlin, Germany, 1986. Springer-Verlag.
P. L. Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519–521, April 1985.
U.S. Department of Commerce/National Institute of Standard and Technol ogy. Digital Signature Standard (DSS), January 27 2000.
National Institute of Standard and Technology. Recommended elliptic curves for federal government use. available at http://csrc.nist.gov/encryption, May 1999.
IEEE P1363 Standard Specifications for Public Key Cryptography, November 1999. Last Preliminary Draft.
R. Schroeppel, H. Orman, S. Omalley, and O. Spatscheck. Fast key exchange with elliptic curve systems. In D. Coppersmith, editor, Advances in Cryptology-CRYPTO’ 95, volume LNCS 963, pages 43–56, Berlin, Germany, 1995. Springer-Verlag.
Standards for Efficient Cryptography Group. SEC2: Recommended Elliptic Curve Domain Parameters. Workingdraft, version 0.7, September 2000.
Texas Instruments, Inc., Dallas, Texas 75265 USA. MSP430C33x,MSP430P337A Mixed Signal Microcontrollers, October 1999 (Revised June 2000).
Texas Instruments, Inc., Dallas, Texas 75265 USA. MSP430x3xx Family-User’s Guide, July 2000.
A. Woodbury, D. V. Bailey, and C. Paar. Elliptic curve cryptography on smart cards without coprocessors. In IFIP CARDIS 2000, Fourth Smart Card Research and Advanced Application Conference, Bristol, UK, September 20–22 2000. Kluwer.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Guajardo, J., Blümel, R., Krieger, U., Paar, C. (2001). Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP430x33x Family of Microcontrollers. In: Kim, K. (eds) Public Key Cryptography. PKC 2001. Lecture Notes in Computer Science, vol 1992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44586-2_27
Download citation
DOI: https://doi.org/10.1007/3-540-44586-2_27
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41658-6
Online ISBN: 978-3-540-44586-9
eBook Packages: Springer Book Archive