loading
Papers

Research.Publish.Connect.

Paper

Authors: Antoine Loiseau 1 and Jacques J. A. Fournier 2

Affiliations: 1 CEA-Tech, Gardanne, France, Mines Saint Etienne, Gardanne and France ; 2 Univ. Grenoble Alpes, CEA Leti, DSYS/LSOSP, F-38000 Grenoble and France

ISBN: 978-989-758-319-3

Keyword(s): IoT, Elliptic Curves Cryptography, Binary Edwards Curves.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Security and Privacy in Mobile Systems

Abstract: Even if recent advances in public key cryptography tend to focus on algorithms able to survive the post quantum era, at present, there is an urgent need to propose fast, low power and securely implemented cryptography to address the immediate security challenges of the IoT. In this document, we present a new set of Binary Edwards Curves which have been defined to achieve the highest security levels (up to 284-bit security level) and whose parameters have been defined to fit IoT devices embedding 32-bit general purpose processors. We optimized the choice of the point generator with the w-coordinate to save a multiplication in the addition and doubling formulae. We manage to compute one step of the Montgomery Ladder in 4 multiplications and 4 squares. On top of the performance benefits, cryptography over such curves have some intrinsic security properties against physical attacks.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 35.173.234.140

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Loiseau, A. and J. A. Fournier, J. (2018). Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT.In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2 SECRYPT: SECRYPT, ISBN 978-989-758-319-3, pages 459-465. DOI: 10.5220/0006831506250631

@conference{secrypt18,
author={Antoine Loiseau. and Jacques J. A. Fournier.},
title={Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT},
booktitle={Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2 SECRYPT: SECRYPT,},
year={2018},
pages={459-465},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006831506250631},
isbn={978-989-758-319-3},
}

TY - CONF

JO - Proceedings of the 15th International Joint Conference on e-Business and Telecommunications - Volume 2 SECRYPT: SECRYPT,
TI - Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT
SN - 978-989-758-319-3
AU - Loiseau, A.
AU - J. A. Fournier, J.
PY - 2018
SP - 459
EP - 465
DO - 10.5220/0006831506250631

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.