Effective Implementations of Scalar Multiplications in Elliptic Curve Cryptography

被引:0
作者
Menandas, Josepha J. [1 ]
Christo, Mary Subaja [1 ]
机构
[1] SRM Inst Sci & Technol, Dept Networking & Commun, Sch Comp, Chennai, India
来源
2024 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATION AND APPLIED INFORMATICS, ACCAI 2024 | 2024年
关键词
Residue Number System; Elliptic Curve Cryptography; Scalar multiplication; Chinese Remainder Theorem; Modular reduction; Point Arithmetic; ALGORITHMS; ECC;
D O I
10.1109/ACCAI61061.2024.10602002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digitization is the term used to describe the current global technological migration from traditional to computational with the aid of IOT. Although the amount of data handled for daily applications is rapidly growing, security issues continue to be a top priority. The elliptic curve cryptography algorithm (ECC) is used in many security protocols for basic security features including digital signatures, authentication, and confidentiality. This technique helps shield data from side channel assaults. Scalar multiplication, which demands more time complexity and involves inverse operations, is essential to the execution of ECC. Here, we present a novel approach to efficiently implement scalar multiplication using the Residue Number System (RNS) with the Sum of Residues (SOR) parallel implementation in order to lower the time complexity of scalar multiplications by converting high-order curve points to low-order ones that have fewer inverse functions. Using point addition and doubling, this new approach is applied to two standard curves: the Edward curve (ED25519) and the Kobilitz curve (SECP256K1). The results demonstrate how well the RNS-based scalar multiplication implements the use of ECC.
引用
收藏
页数:7
相关论文
共 25 条
  • [1] Aburto Cristobal Leiva, 2019, OPTIMAL 2 3 CHAINS S, P89, DOI [10.1007/978-3-030-25283-0_5, DOI 10.1007/978-3-030-25283-0_5]
  • [2] Fast and Flexible Hardware Support for ECC Over Multiple Standard Prime Fields
    Alrimeih, Hamad
    Rakhmatov, Daler
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014, 22 (12) : 2661 - 2674
  • [3] [Anonymous], 2000, STANDARDS EFFICIENT
  • [4] A Fully RNS based ECC Processor
    Asif, Shahzad
    Hossain, Md Selim
    Kong, Yinan
    Abdul, Wadood
    [J]. INTEGRATION-THE VLSI JOURNAL, 2018, 61 : 138 - 149
  • [5] High-throughput multi-key elliptic curve cryptosystem based on residue number system
    Asif, Shahzad
    Hossain, Md Selim
    Kong, Yinan
    [J]. IET COMPUTERS AND DIGITAL TECHNIQUES, 2017, 11 (05) : 165 - 172
  • [6] Bernstein DJ, 2008, LECT NOTES COMPUT SC, V5023, P389
  • [7] Trading inversions for multiplications in elliptic curve cryptography
    Ciet, M
    Joye, M
    Lauter, K
    Montgomery, PL
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2006, 39 (02) : 189 - 206
  • [8] Cohen H., 2012, Handbook of Elliptic and Hyperelliptic Curve Cryptography
  • [9] DIMITROV V, 1995, IEICE T FUND ELECTR, VE78A, P82
  • [10] Efficient RNS Implementation of Elliptic Curve Point Multiplication Over GF(p)
    Esmaeildoust, Mohammad
    Schinianakis, Dimitrios
    Javashi, Hamid
    Stouraitis, Thanos
    Navi, Keivan
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2013, 21 (08) : 1545 - 1549