MoTE-ECC Based Encryption on MSP430

Hwajeong Seo; Howon Kim
September 2017
Journal of Information & Communication Convergence Engineering;Sep2017, Vol. 15 Issue 3, p160
Academic Journal
Public key cryptography (PKC) is the basic building block for the cryptography applications such as encryption, key distribution, and digital signature scheme. Among many PKC, elliptic curve cryptography (ECC) is the most widely used in IT systems. Recently, very efficient Montgomery-Twisted-Edward (MoTE)-ECC was suggested, which supports low complexity for the finite field arithmetic, group operation, and scalar multiplication. However, we cannot directly adopt the MoTE-ECC to new PKC systems since the cryptography is not fully evaluated in terms of performance on the Internet of Things (IoT) platforms, which only supports very limited computation power, energy, and storage. In this paper, we fully evaluate the MoTE-ECC implementations on the representative IoT devices (16-bit MSP processors). The implementation is highly optimized for the target platform and compared in three different factors (ROM, RAM, and execution time). The work provides good reference results for a gradual transition from legacy ECC to MoTE-ECC on emerging IoT platforms.


Related Articles

  • Signcryption Scheme that Utilizes Elliptic Curve for both Encryption and Signature Generation. Ahirwal, Ramratan; Jain, Anjali; Jain, Y. K. // International Journal of Computer Applications;2013, Vol. 62, p41 

    Signcryption is a relatively new technique in public key cryptography, that perform both the functions of digital signature and encryption in a single step ,in a way that is more efficient than signing and encrypting separately. Signcryption scheme can achieve authentication and encryption...

  • DESIGN OF MOBILE PUBLIC KEY INFRASTRUCTURE (M-PKI) USING ELLIPTIC CURVE CRYPTOGRAPHY. Ray, Sangram; Biswas, G. P. // International Journal on Cryptography & Information Security;Mar2013, Vol. 3 Issue 1, p25 

    Recently the demand of mobile phones and their applications are increasing rapidly and as a result, it becomes essential to design and/or improve the existing PKI (Public Key Infrastructure) useful for mobile phones or devices. Since a mobile phone has small screen, low computing power, small...

  • CRYPTOGRAPHIC PROTOCOLS USING ELLIPTIC CURVE OVER FINITE FIELDS. KUMAR, D. SRAVANA; SUNEETHA, CH.; CHANDRASEKHAR, A. // International Journal of Engineering Science & Technology;Jan2012, Vol. 4 Issue 1, p81 

    Cryptology is the study of techniques for ensuring the secrecy and authentication of the information. Public -key encryption schemes are secure only if the authenticity of the public-key is assured. Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptographic (ECC)...

  • New Public Key Cryptosystem based on Weil Pairing. Sharma, B. K.; Sahu, Hemlal // International Journal of Advanced Networking & Applications;2013, Vol. 5 Issue 2, p1883 

    In 1987 Koblitz and Miller first proposed public key cryptosystems using the group of points of an elliptic curve over a finite field. The security of these cryptosystems was based upon the presumed intractability of the problem of computing logarithm in the elliptic curve group. Now we propose...

  • A Survey on Elliptical Curve Cryptography in Different Methods. Verma, Kanaklata; Agrawal, Himani // International Journal of Advanced Research in Computer Science;Mar/Apr2013, Vol. 4 Issue 2, p101 

    The paper presents study of elliptic curve cryptography (ECC) and its applications. Elliptic Curve Cryptography (ECC) is a public key cryptography. In public key cryptography each user or the device taking part in the communication generally have a pair of keys, a public key and a private key,...

  • A Secured Public Key Cryptosystem for Biometric Encryption. Gobi, M.; Kannan, D. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 1, p184 

    Summary -In the modern era security plays an important role in each and every field. The needs for stringent security measures in biometric systems have greater importance for information security systems. The biometric systems to offer reliable and high security to ensure invulnerability. This...

  • An Appropriate Public Key Cryptosystem for Mobile Electronic Business Secure. BIAN Baowu // Journal of Convergence Information Technology;Sep2012, Vol. 7 Issue 16, p515 

    This paper discusses about the security of mobile agents and agent hosts in electronic business applications. We focus on the cryptographic solutions for the confidentiality, integrity, authenticity, and non-repudiation in mobile agent networks environments. In order to protect the security of...

  • A Novel Public Key Image Cryptosystem Based on Elliptic Curve and Arnold Cat Map. Ling-jiao CHEN; Ao-dong SHEN // Advanced Materials Research;7/24/2014, Vol. 989-994, p4183 

    For decades, symmetric cryptosystems, such as chaos-based ones, are designed for image encryption. In this paper, a novel public key scheme for image encryption is presented. Based on the improved elliptic curve cryptosystem and Arnold cat map, the novel scheme can offer high security while...

  • Mediated Certificateless Signature without Random Oracles. Minghui Zheng; Jing Zhang; Zhi Zhang // Journal of Networks;Aug2011, Vol. 6 Issue 8, p1222 

    It is worthwhile challenges to deal with the key escrow problem and key revocation in identity-based signatures. We first introduce the notion of security-mediated certificateless signature scheme and proves the scheme in the standard model. The mediated certificate less public key cryptography...

  • DNA Computing based Elliptic Curve Cryptography. Vijayakumar, P.; Vijayalakshmi, V.; Zayaraz, G. // International Journal of Computer Applications;Dec2011, Vol. 36, p18 

    Cryptography is the science of using mathematics to encrypt and decrypt the data for secure communication. It enables the user to transmit the data in insecure network so that it cannot be read by anyone except the intended recipient. RSA and Elliptic Curve Cryptography are the existing public...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics