AN EFFICIENT ELLIPTIC CURVE CRYPTOGRAPHY PROCESSOR USING ADDITION CHAINS WITH HIGH INFORMATION ENTROPY

被引:0
作者
Leinweber, Lawrence [1 ]
Papachristou, Christos [1 ]
Wolff, Francis G. [1 ]
机构
[1] Case Western Reserve Univ, Cleveland, OH 44106 USA
来源
2012 25TH IEEE CANADIAN CONFERENCE ON ELECTRICAL & COMPUTER ENGINEERING (CCECE) | 2012年
关键词
Public key; Cryptography; Elliptic curves;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
RFID tags in the supply chain provide the capabilities of bar codes without requiring a line of sight, but this benefit can compromise the privacy of the tag owner. The problem can be corrected by equipping RFID tags with public key cryptography but due to the extreme constraints on area and power, the processor must be as small and as energy-efficient as possible. We present a public key cryptography processor (based on elliptic curves over binary extension fields) that does not use the Montgomery ladder algorithm. The new algorithm has the processor perform point additions based on integer addition chains, without computing the integer chains. Point doubling is performed only once per encryption. Key bits are interpreted in a new way, but the algorithm is independent of the key, resisting simple side-channel attacks. This paper includes an analysis of information entropy, to determine the strength of keys and improve processor design. The processor's performance results are presented, and are competitive with the smallest, lowest-energy designs in the literature.
引用
收藏
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 1999, REC ELL CURV FED GOV
[2]  
[Anonymous], 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography
[3]  
[Anonymous], SEC 1 ELL CURV CRYPT
[4]  
BATINA L, 2007, IEEE INT WORKSH PERV
[5]  
Batina L., 2006, PUBLICATION IST 2002
[6]  
Bernstein D.J., 2008, LECT NOTES COMPUTER, V5154
[7]  
Finkenzeller K., 2003, RFID HDB FUNDAMENTAL, V2nd ed.
[8]  
Garfinkel S., 2005, RFID APPL SECURITY P
[9]  
Goundar R.R., 2009, INT J APPL MATH COMP
[10]  
Itoh T., 1988, INF COMPUT