Studying Software Implementations of Elliptic Curve Cryptography

Hai Yan, Zhijie Jerry Shi
2006 Third International Conference on Information Technology: New Generations (ITNG'06)  
Elliptic Curve Cryptography (ECC) is a promising alternative for public-key algorithms in resource-constrained systems because it provides a similar level of security with much shorter keys than conventional integer-based publickey algorithms. ECC over binary field is of special interest because the operations in binary field are thought more space and time efficient. However, the software implementations of ECC over binary field are still slow, especially on low-end processors used in small
more » ... puting devices such as sensor nodes. In this paper, we studied software implementations of ECC. We first investigated whether some architectural parameters such as word size may affect the choice of algorithms when implementing ECC with software. We identified a set of algorithms for ECC implementation for low-end processors. We also examined several improvements to the instruction set architecture of an 8-bit processor and studied their impact on the performance of ECC.
doi:10.1109/itng.2006.127 dblp:conf/itng/YanS06 fatcat:nc23cotjpvhdzhf352vshehuti