Ontology type: schema:Chapter
2015
AUTHORSGesine Hinterwälder , Amir Moradi , Michael Hutter , Peter Schwabe , Christof Paar
ABSTRACTIn the era of the Internet of Things, smart electronic devices facilitate processes in our everyday lives. Texas Instrument’s MSP430 microcontrollers target low-power applications, among which are wireless sensor, metering and medical applications. Those domains have in common that sensitive data is processed, which calls for strong security primitives to be implemented on those devices. Curve25519, which builds on a 255-bit prime field, has been proposed as an efficient, highly-secure elliptic-curve. While its high performance on powerful processors has been shown, the question remains, whether it is suitable for use in embedded devices. In this paper we present an implementation of Curve25519 for MSP430 microcontrollers. To combat timing attacks, we completely avoid conditional jumps and loads, thus making our software constant time. We give a comprehensive evaluation of different implementations of the modular multiplication and show which ones are favorable for different conditions. We further present implementation results of Curve25519, where our best implementation requires 9.1 million or 6.5 million cycles on MSP430Xs having a \(16\times 16\)-bit or a \(32\times 32\)-bit hardware multiplier respectively. More... »
PAGES31-47
Progress in Cryptology - LATINCRYPT 2014
ISBN
978-3-319-16294-2
978-3-319-16295-9
http://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2
DOIhttp://dx.doi.org/10.1007/978-3-319-16295-9_2
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1007958487
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Communications Technologies",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Technology",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Ruhr University Bochum",
"id": "https://www.grid.ac/institutes/grid.5570.7",
"name": [
"Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany"
],
"type": "Organization"
},
"familyName": "Hinterw\u00e4lder",
"givenName": "Gesine",
"id": "sg:person.016347320117.34",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016347320117.34"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Ruhr University Bochum",
"id": "https://www.grid.ac/institutes/grid.5570.7",
"name": [
"Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany"
],
"type": "Organization"
},
"familyName": "Moradi",
"givenName": "Amir",
"id": "sg:person.015303112617.60",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015303112617.60"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Graz University of Technology",
"id": "https://www.grid.ac/institutes/grid.410413.3",
"name": [
"Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Graz, Austria"
],
"type": "Organization"
},
"familyName": "Hutter",
"givenName": "Michael",
"id": "sg:person.014316344436.77",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014316344436.77"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Radboud University Nijmegen",
"id": "https://www.grid.ac/institutes/grid.5590.9",
"name": [
"Digital Security Group, Radboud University Nijmegen, Nijmegen, The Netherlands"
],
"type": "Organization"
},
"familyName": "Schwabe",
"givenName": "Peter",
"id": "sg:person.010637555557.91",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010637555557.91"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Ruhr University Bochum",
"id": "https://www.grid.ac/institutes/grid.5570.7",
"name": [
"Horst G\u00f6rtz Institute for IT Security, Ruhr-University Bochum, Bochum, Germany"
],
"type": "Organization"
},
"familyName": "Paar",
"givenName": "Christof",
"id": "sg:person.016666667155.68",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016666667155.68"
],
"type": "Person"
}
],
"citation": [
{
"id": "https://doi.org/10.1145/1514274.1514276",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1001431469"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-25286-0_3",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1001715024",
"https://doi.org/10.1007/978-3-642-25286-0_3"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s13389-012-0029-z",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1002198320",
"https://doi.org/10.1007/s13389-012-0029-z"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-10628-6_17",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1003968777",
"https://doi.org/10.1007/978-3-642-10628-6_17"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-10628-6_17",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1003968777",
"https://doi.org/10.1007/978-3-642-10628-6_17"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-02384-2_23",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1004091122",
"https://doi.org/10.1007/978-3-642-02384-2_23"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-38553-7_9",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1009383266",
"https://doi.org/10.1007/978-3-642-38553-7_9"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-03356-8_19",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1012320763",
"https://doi.org/10.1007/978-3-642-03356-8_19"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s13389-015-0093-2",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1015478192",
"https://doi.org/10.1007/s13389-015-0093-2"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s00145-009-9049-y",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017461552",
"https://doi.org/10.1007/s00145-009-9049-y"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s00145-009-9049-y",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017461552",
"https://doi.org/10.1007/s00145-009-9049-y"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/s00145-009-9049-y",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1017461552",
"https://doi.org/10.1007/s00145-009-9049-y"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-319-05960-0_3",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1027314402",
"https://doi.org/10.1007/978-3-319-05960-0_3"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-33027-8_19",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1030639334",
"https://doi.org/10.1007/978-3-642-33027-8_19"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11745853_14",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1030714294",
"https://doi.org/10.1007/11745853_14"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/11745853_14",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1030714294",
"https://doi.org/10.1007/11745853_14"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-77690-1_19",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1038588160",
"https://doi.org/10.1007/978-3-540-77690-1_19"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-540-77690-1_19",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1038588160",
"https://doi.org/10.1007/978-3-540-77690-1_19"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-319-03515-4_16",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1039355960",
"https://doi.org/10.1007/978-3-319-03515-4_16"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-27257-8_11",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1043248200",
"https://doi.org/10.1007/978-3-642-27257-8_11"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-15031-9_8",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1046226105",
"https://doi.org/10.1007/978-3-642-15031-9_8"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-15031-9_8",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1046226105",
"https://doi.org/10.1007/978-3-642-15031-9_8"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-23951-9_30",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1047137953",
"https://doi.org/10.1007/978-3-642-23951-9_30"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-3-642-23951-9_30",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1047137953",
"https://doi.org/10.1007/978-3-642-23951-9_30"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-44586-2_27",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1049925081",
"https://doi.org/10.1007/3-540-44586-2_27"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-44586-2_27",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1049925081",
"https://doi.org/10.1007/3-540-44586-2_27"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1090/s0025-5718-1987-0866113-7",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1050650230"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/ipsn.2008.47",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1093251515"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/sp.2008.31",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095092296"
],
"type": "CreativeWork"
}
],
"datePublished": "2015",
"datePublishedReg": "2015-01-01",
"description": "In the era of the Internet of Things, smart electronic devices facilitate processes in our everyday lives. Texas Instrument\u2019s MSP430 microcontrollers target low-power applications, among which are wireless sensor, metering and medical applications. Those domains have in common that sensitive data is processed, which calls for strong security primitives to be implemented on those devices. Curve25519, which builds on a 255-bit prime field, has been proposed as an efficient, highly-secure elliptic-curve. While its high performance on powerful processors has been shown, the question remains, whether it is suitable for use in embedded devices. In this paper we present an implementation of Curve25519 for MSP430 microcontrollers. To combat timing attacks, we completely avoid conditional jumps and loads, thus making our software constant time. We give a comprehensive evaluation of different implementations of the modular multiplication and show which ones are favorable for different conditions. We further present implementation results of Curve25519, where our best implementation requires 9.1\u00a0million or 6.5\u00a0million cycles on MSP430Xs having a \\(16\\times 16\\)-bit or a \\(32\\times 32\\)-bit hardware multiplier respectively.",
"editor": [
{
"familyName": "Aranha",
"givenName": "Diego F.",
"type": "Person"
},
{
"familyName": "Menezes",
"givenName": "Alfred",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-319-16295-9_2",
"inLanguage": [
"en"
],
"isAccessibleForFree": false,
"isFundedItemOf": [
{
"id": "sg:grant.6208039",
"type": "MonetaryGrant"
},
{
"id": "sg:grant.6194109",
"type": "MonetaryGrant"
},
{
"id": "sg:grant.6188238",
"type": "MonetaryGrant"
},
{
"id": "sg:grant.6208637",
"type": "MonetaryGrant"
}
],
"isPartOf": {
"isbn": [
"978-3-319-16294-2",
"978-3-319-16295-9"
],
"name": "Progress in Cryptology - LATINCRYPT 2014",
"type": "Book"
},
"name": "Full-Size High-Security ECC Implementation on MSP430 Microcontrollers",
"pagination": "31-47",
"productId": [
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-319-16295-9_2"
]
},
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"25e9c6ace6cd3b5e01acc80357da5be8e1c8706588d18135c75ddf893f0ddc86"
]
},
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1007958487"
]
}
],
"publisher": {
"location": "Cham",
"name": "Springer International Publishing",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-319-16295-9_2",
"https://app.dimensions.ai/details/publication/pub.1007958487"
],
"sdDataset": "chapters",
"sdDatePublished": "2019-04-15T18:09",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8681_00000248.jsonl",
"type": "Chapter",
"url": "http://link.springer.com/10.1007/978-3-319-16295-9_2"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-16295-9_2'
This table displays all metadata directly associated to this object as RDF triples.
192 TRIPLES
23 PREDICATES
48 URIs
20 LITERALS
8 BLANK NODES