Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2007

AUTHORS

Leif Uhsadel , Axel Poschmann , Christof Paar

ABSTRACT

In this article we present the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro controller which are typically used in WSNs. The major part (77%) of the processing time for an elliptic curve operation such as ECDSA or EC Diffie-Hellman is spent on modular multiplication. We present an optimized arithmetic algorithm which significantly speed up ECC schemes. The reduced processing time also yields a significantly lower energy consumption of ECC schemes. With our implementation results we can show that a 160-bit modular multiplication can be performed in 0.39 ms on an 8-bit AVR processor clocked at 7.37 MHz. This brings the vision of asymmetric cryptography in the field of WSNs with all its benefits for key-distribution and authentication a step closer to reality. More... »

PAGES

73-86

Book

TITLE

Security and Privacy in Ad-hoc and Sensor Networks

ISBN

978-3-540-73274-7
978-3-540-73275-4

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-73275-4_6

DOI

http://dx.doi.org/10.1007/978-3-540-73275-4_6

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1009898538


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Ruhr University Bochum", 
          "id": "https://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Horst G\u00f6rtz Institute for IT Security, Communication Security Group (COSY), Ruhr-Universit\u00e4t Bochum, Germany, Universit\u00e4tsstrasse 150, 44780 Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Uhsadel", 
        "givenName": "Leif", 
        "id": "sg:person.013754660575.37", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013754660575.37"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr University Bochum", 
          "id": "https://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Horst G\u00f6rtz Institute for IT Security, Communication Security Group (COSY), Ruhr-Universit\u00e4t Bochum, Germany, Universit\u00e4tsstrasse 150, 44780 Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Poschmann", 
        "givenName": "Axel", 
        "id": "sg:person.07620350765.38", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07620350765.38"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ruhr University Bochum", 
          "id": "https://www.grid.ac/institutes/grid.5570.7", 
          "name": [
            "Horst G\u00f6rtz Institute for IT Security, Communication Security Group (COSY), Ruhr-Universit\u00e4t Bochum, Germany, Universit\u00e4tsstrasse 150, 44780 Bochum, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Paar", 
        "givenName": "Christof", 
        "id": "sg:person.016666667155.68", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016666667155.68"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/586110.586117", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1007488868"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-28632-5_9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008174972", 
          "https://doi.org/10.1007/978-3-540-28632-5_9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-3-540-28632-5_9", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008174972", 
          "https://doi.org/10.1007/978-3-540-28632-5_9"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-45353-9_19", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021281712", 
          "https://doi.org/10.1007/3-540-45353-9_19"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/384264.379006", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1024012736"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/948109.948118", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029515707"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1029102.1029113", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1047765347"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mm.2002.1134340", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061408167"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2007", 
    "datePublishedReg": "2007-01-01", 
    "description": "In this article we present the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro controller which are typically used in WSNs. The major part (77%) of the processing time for an elliptic curve operation such as ECDSA or EC Diffie-Hellman is spent on modular multiplication. We present an optimized arithmetic algorithm which significantly speed up ECC schemes. The reduced processing time also yields a significantly lower energy consumption of ECC schemes. With our implementation results we can show that a 160-bit modular multiplication can be performed in 0.39 ms on an 8-bit AVR processor clocked at 7.37 MHz. This brings the vision of asymmetric cryptography in the field of WSNs with all its benefits for key-distribution and authentication a step closer to reality.", 
    "editor": [
      {
        "familyName": "Stajano", 
        "givenName": "Frank", 
        "type": "Person"
      }, 
      {
        "familyName": "Meadows", 
        "givenName": "Catherine", 
        "type": "Person"
      }, 
      {
        "familyName": "Capkun", 
        "givenName": "Srdjan", 
        "type": "Person"
      }, 
      {
        "familyName": "Moore", 
        "givenName": "Tyler", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-73275-4_6", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-73274-7", 
        "978-3-540-73275-4"
      ], 
      "name": "Security and Privacy in Ad-hoc and Sensor Networks", 
      "type": "Book"
    }, 
    "name": "Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes", 
    "pagination": "73-86", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-73275-4_6"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "2f27f28614b9d31dc1c7bf8ae0bfe5b31fb81bb06658ac77bc823d51894e1350"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1009898538"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-73275-4_6", 
      "https://app.dimensions.ai/details/publication/pub.1009898538"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T05:23", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000345_0000000345/records_64082_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-540-73275-4_6"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73275-4_6'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73275-4_6'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73275-4_6'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-73275-4_6'


 

This table displays all metadata directly associated to this object as RDF triples.

117 TRIPLES      23 PREDICATES      34 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-73275-4_6 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author Nc66bba36a9a8465d942c1ed25d8c252a
4 schema:citation sg:pub.10.1007/3-540-45353-9_19
5 sg:pub.10.1007/978-3-540-28632-5_9
6 https://doi.org/10.1109/mm.2002.1134340
7 https://doi.org/10.1145/1029102.1029113
8 https://doi.org/10.1145/384264.379006
9 https://doi.org/10.1145/586110.586117
10 https://doi.org/10.1145/948109.948118
11 schema:datePublished 2007
12 schema:datePublishedReg 2007-01-01
13 schema:description In this article we present the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro controller which are typically used in WSNs. The major part (77%) of the processing time for an elliptic curve operation such as ECDSA or EC Diffie-Hellman is spent on modular multiplication. We present an optimized arithmetic algorithm which significantly speed up ECC schemes. The reduced processing time also yields a significantly lower energy consumption of ECC schemes. With our implementation results we can show that a 160-bit modular multiplication can be performed in 0.39 ms on an 8-bit AVR processor clocked at 7.37 MHz. This brings the vision of asymmetric cryptography in the field of WSNs with all its benefits for key-distribution and authentication a step closer to reality.
14 schema:editor Nb800bc993213404f85844e7a2aa6dca7
15 schema:genre chapter
16 schema:inLanguage en
17 schema:isAccessibleForFree true
18 schema:isPartOf Necf924985b2141b4bac52ffd1dea9a60
19 schema:name Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes
20 schema:pagination 73-86
21 schema:productId N06e764db71354c1ab2d5717a5b5fbb34
22 Ne151f70ce4e14afa8c4848bd7a973a81
23 Ne565cbce1c724edc95c80c510f83a400
24 schema:publisher Nf4911c77004d46f38fd05fc0e5b26e9c
25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009898538
26 https://doi.org/10.1007/978-3-540-73275-4_6
27 schema:sdDatePublished 2019-04-16T05:23
28 schema:sdLicense https://scigraph.springernature.com/explorer/license/
29 schema:sdPublisher Na1c1cc643ed5402aaec1c5617902f17a
30 schema:url https://link.springer.com/10.1007%2F978-3-540-73275-4_6
31 sgo:license sg:explorer/license/
32 sgo:sdDataset chapters
33 rdf:type schema:Chapter
34 N06e764db71354c1ab2d5717a5b5fbb34 schema:name dimensions_id
35 schema:value pub.1009898538
36 rdf:type schema:PropertyValue
37 N145addb8e16d4108951d3106f44d8df2 schema:familyName Capkun
38 schema:givenName Srdjan
39 rdf:type schema:Person
40 N46a3c2ca926445fa9b40500556612470 rdf:first N145addb8e16d4108951d3106f44d8df2
41 rdf:rest N9e4b31d3e28d4f2da8630d80613d3344
42 N4f2aa84431de46ebb308583145ddcb65 rdf:first Nd61288b9726e4eadb144e5dfddcf73ea
43 rdf:rest N46a3c2ca926445fa9b40500556612470
44 N50e89e735fec4e86a1e05ad87585286b schema:familyName Moore
45 schema:givenName Tyler
46 rdf:type schema:Person
47 N8cd3af7283624cb7975e8de0f47a1a52 rdf:first sg:person.016666667155.68
48 rdf:rest rdf:nil
49 N9065e931fdd54257b4df513a78ccc360 schema:familyName Stajano
50 schema:givenName Frank
51 rdf:type schema:Person
52 N9e4b31d3e28d4f2da8630d80613d3344 rdf:first N50e89e735fec4e86a1e05ad87585286b
53 rdf:rest rdf:nil
54 Na1c1cc643ed5402aaec1c5617902f17a schema:name Springer Nature - SN SciGraph project
55 rdf:type schema:Organization
56 Nb800bc993213404f85844e7a2aa6dca7 rdf:first N9065e931fdd54257b4df513a78ccc360
57 rdf:rest N4f2aa84431de46ebb308583145ddcb65
58 Nc66bba36a9a8465d942c1ed25d8c252a rdf:first sg:person.013754660575.37
59 rdf:rest Ne53662b8e5924cd38dd54b7a290a8d94
60 Nd61288b9726e4eadb144e5dfddcf73ea schema:familyName Meadows
61 schema:givenName Catherine
62 rdf:type schema:Person
63 Ne151f70ce4e14afa8c4848bd7a973a81 schema:name doi
64 schema:value 10.1007/978-3-540-73275-4_6
65 rdf:type schema:PropertyValue
66 Ne53662b8e5924cd38dd54b7a290a8d94 rdf:first sg:person.07620350765.38
67 rdf:rest N8cd3af7283624cb7975e8de0f47a1a52
68 Ne565cbce1c724edc95c80c510f83a400 schema:name readcube_id
69 schema:value 2f27f28614b9d31dc1c7bf8ae0bfe5b31fb81bb06658ac77bc823d51894e1350
70 rdf:type schema:PropertyValue
71 Necf924985b2141b4bac52ffd1dea9a60 schema:isbn 978-3-540-73274-7
72 978-3-540-73275-4
73 schema:name Security and Privacy in Ad-hoc and Sensor Networks
74 rdf:type schema:Book
75 Nf4911c77004d46f38fd05fc0e5b26e9c schema:location Berlin, Heidelberg
76 schema:name Springer Berlin Heidelberg
77 rdf:type schema:Organisation
78 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
79 schema:name Information and Computing Sciences
80 rdf:type schema:DefinedTerm
81 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
82 schema:name Data Format
83 rdf:type schema:DefinedTerm
84 sg:person.013754660575.37 schema:affiliation https://www.grid.ac/institutes/grid.5570.7
85 schema:familyName Uhsadel
86 schema:givenName Leif
87 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013754660575.37
88 rdf:type schema:Person
89 sg:person.016666667155.68 schema:affiliation https://www.grid.ac/institutes/grid.5570.7
90 schema:familyName Paar
91 schema:givenName Christof
92 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016666667155.68
93 rdf:type schema:Person
94 sg:person.07620350765.38 schema:affiliation https://www.grid.ac/institutes/grid.5570.7
95 schema:familyName Poschmann
96 schema:givenName Axel
97 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07620350765.38
98 rdf:type schema:Person
99 sg:pub.10.1007/3-540-45353-9_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021281712
100 https://doi.org/10.1007/3-540-45353-9_19
101 rdf:type schema:CreativeWork
102 sg:pub.10.1007/978-3-540-28632-5_9 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008174972
103 https://doi.org/10.1007/978-3-540-28632-5_9
104 rdf:type schema:CreativeWork
105 https://doi.org/10.1109/mm.2002.1134340 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061408167
106 rdf:type schema:CreativeWork
107 https://doi.org/10.1145/1029102.1029113 schema:sameAs https://app.dimensions.ai/details/publication/pub.1047765347
108 rdf:type schema:CreativeWork
109 https://doi.org/10.1145/384264.379006 schema:sameAs https://app.dimensions.ai/details/publication/pub.1024012736
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1145/586110.586117 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007488868
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1145/948109.948118 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029515707
114 rdf:type schema:CreativeWork
115 https://www.grid.ac/institutes/grid.5570.7 schema:alternateName Ruhr University Bochum
116 schema:name Horst Görtz Institute for IT Security, Communication Security Group (COSY), Ruhr-Universität Bochum, Germany, Universitätsstrasse 150, 44780 Bochum, Germany
117 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...