Ontology type: schema:Chapter Open Access: True
2004
AUTHORSNils Gura , Arun Patel , Arvinderpal Wander , Hans Eberle , Sheueling Chang Shantz
ABSTRACTStrong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. We revisited this statement and implemented elliptic curve point multiplication for 160-bit, 192-bit, and 224-bit NIST/SECG curves over GF(p) and RSA-1024 and RSA-2048 on two 8-bit microcontrollers. To accelerate multiple-precision multiplication, we propose a new algorithm to reduce the number of memory accesses. Implementation and analysis led to three observations: 1. Public-key cryptography is viable on small devices without hardware acceleration. On an Atmel ATmega128 at 8 MHz we measured 0.81s for 160-bit ECC point multiplication and 0.43s for a RSA-1024 operation with exponent e=216+1. 2. The relative performance advantage of ECC point multiplication over RSA modular exponentiation increases with the decrease in processor word size and the increase in key size. 3. Elliptic curves over fields using pseudo-Mersenne primes as standardized by NIST and SECG allow for high performance implementations and show no performance disadvantage over optimal extension fields or prime fields selected specifically for a particular processor architecture. More... »
PAGES119-132
Cryptographic Hardware and Embedded Systems - CHES 2004
ISBN
978-3-540-22666-6
978-3-540-28632-5
http://scigraph.springernature.com/pub.10.1007/978-3-540-28632-5_9
DOIhttp://dx.doi.org/10.1007/978-3-540-28632-5_9
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1008174972
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"name": [
"Sun Microsystems Laboratories"
],
"type": "Organization"
},
"familyName": "Gura",
"givenName": "Nils",
"id": "sg:person.015253241204.71",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015253241204.71"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Sun Microsystems Laboratories"
],
"type": "Organization"
},
"familyName": "Patel",
"givenName": "Arun",
"id": "sg:person.011257007151.00",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011257007151.00"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Sun Microsystems Laboratories"
],
"type": "Organization"
},
"familyName": "Wander",
"givenName": "Arvinderpal",
"id": "sg:person.012651750151.41",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012651750151.41"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Sun Microsystems Laboratories"
],
"type": "Organization"
},
"familyName": "Eberle",
"givenName": "Hans",
"id": "sg:person.014475300515.81",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014475300515.81"
],
"type": "Person"
},
{
"affiliation": {
"name": [
"Sun Microsystems Laboratories"
],
"type": "Organization"
},
"familyName": "Shantz",
"givenName": "Sheueling Chang",
"id": "sg:person.016665622115.07",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016665622115.07"
],
"type": "Person"
}
],
"citation": [
{
"id": "sg:pub.10.1007/bfb0054024",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1021283536",
"https://doi.org/10.1007/bfb0054024"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/bfb0055748",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1021339129",
"https://doi.org/10.1007/bfb0055748"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/3-540-49649-1_6",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1028653910",
"https://doi.org/10.1007/3-540-49649-1_6"
],
"type": "CreativeWork"
},
{
"id": "sg:pub.10.1007/978-0-387-35528-3_5",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1046807342",
"https://doi.org/10.1007/978-0-387-35528-3_5"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.21914/anziamj.v44i0.686",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1069281086"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1051/ita/1990240605311",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1083550351"
],
"type": "CreativeWork"
},
{
"id": "https://doi.org/10.1109/cahpc.2002.1180754",
"sameAs": [
"https://app.dimensions.ai/details/publication/pub.1095722387"
],
"type": "CreativeWork"
}
],
"datePublished": "2004",
"datePublishedReg": "2004-01-01",
"description": "Strong public-key cryptography is often considered to be too computationally expensive for small devices if not accelerated by cryptographic hardware. We revisited this statement and implemented elliptic curve point multiplication for 160-bit, 192-bit, and 224-bit NIST/SECG curves over GF(p) and RSA-1024 and RSA-2048 on two 8-bit microcontrollers. To accelerate multiple-precision multiplication, we propose a new algorithm to reduce the number of memory accesses. Implementation and analysis led to three observations: 1. Public-key cryptography is viable on small devices without hardware acceleration. On an Atmel ATmega128 at 8 MHz we measured 0.81s for 160-bit ECC point multiplication and 0.43s for a RSA-1024 operation with exponent e=216+1. 2. The relative performance advantage of ECC point multiplication over RSA modular exponentiation increases with the decrease in processor word size and the increase in key size. 3. Elliptic curves over fields using pseudo-Mersenne primes as standardized by NIST and SECG allow for high performance implementations and show no performance disadvantage over optimal extension fields or prime fields selected specifically for a particular processor architecture.",
"editor": [
{
"familyName": "Joye",
"givenName": "Marc",
"type": "Person"
},
{
"familyName": "Quisquater",
"givenName": "Jean-Jacques",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-540-28632-5_9",
"inLanguage": [
"en"
],
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-540-22666-6",
"978-3-540-28632-5"
],
"name": "Cryptographic Hardware and Embedded Systems - CHES 2004",
"type": "Book"
},
"name": "Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs",
"pagination": "119-132",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1008174972"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-540-28632-5_9"
]
},
{
"name": "readcube_id",
"type": "PropertyValue",
"value": [
"26f294b9c5c4822733472a6fc62feb28e71cd6ada3808815931539c6fd62dd28"
]
}
],
"publisher": {
"location": "Berlin, Heidelberg",
"name": "Springer Berlin Heidelberg",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-540-28632-5_9",
"https://app.dimensions.ai/details/publication/pub.1008174972"
],
"sdDataset": "chapters",
"sdDatePublished": "2019-04-16T08:24",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000363_0000000363/records_70046_00000000.jsonl",
"type": "Chapter",
"url": "https://link.springer.com/10.1007%2F978-3-540-28632-5_9"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-28632-5_9'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-28632-5_9'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-28632-5_9'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-28632-5_9'
This table displays all metadata directly associated to this object as RDF triples.
130 TRIPLES
23 PREDICATES
34 URIs
20 LITERALS
8 BLANK NODES