Author
Listed:
- Stefano Di Matteo
(Department of Information Engineering, University of Pisa, Via G. Caruso 16, 56122 Pisa, Italy
These authors contributed equally to this work.)
- Luca Baldanzi
(Department of Information Engineering, University of Pisa, Via G. Caruso 16, 56122 Pisa, Italy
These authors contributed equally to this work.)
- Luca Crocetti
(Department of Information Engineering, University of Pisa, Via G. Caruso 16, 56122 Pisa, Italy
These authors contributed equally to this work.)
- Pietro Nannipieri
(Department of Information Engineering, University of Pisa, Via G. Caruso 16, 56122 Pisa, Italy
These authors contributed equally to this work.)
- Luca Fanucci
(Department of Information Engineering, University of Pisa, Via G. Caruso 16, 56122 Pisa, Italy
These authors contributed equally to this work.)
- Sergio Saponara
(Department of Information Engineering, University of Pisa, Via G. Caruso 16, 56122 Pisa, Italy
These authors contributed equally to this work.)
Abstract
Cybersecurity is a critical issue for Real-Time IoT applications since high performance and low latencies are required, along with security requirements to protect the large number of attack surfaces to which IoT devices are exposed. Elliptic Curve Cryptography (ECC) is largely adopted in an IoT context to provide security services such as key-exchange and digital signature. For Real-Time IoT applications, hardware acceleration for ECC-based algorithms can be mandatory to meet low-latency and low-power/energy requirements. In this paper, we propose a fast and configurable hardware accelerator for NIST P-256/-521 elliptic curves, developed in the context of the European Processor Initiative. The proposed architecture supports the most used cryptography schemes based on ECC such as Elliptic Curve Digital Signature Algorithm (ECDSA), Elliptic Curve Integrated Encryption Scheme (ECIES), Elliptic Curve Diffie-Hellman (ECDH) and Elliptic Curve Menezes-Qu-Vanstone (ECMQV). A modified version of Double-And-Add-Always algorithm for Point Multiplication has been proposed, which allows the execution of Point Addition and Doubling operations concurrently and implements countermeasures against power and timing attacks. A simulated approach to extract power traces has been used to assess the effectiveness of the proposed algorithm compared to classical algorithms for Point Multiplication. A constant-time version of the Shamir’s Trick has been adopted to speed-up the Double-Point Multiplication and modular inversion is executed using Fermat’s Little Theorem, reusing the internal modular multipliers. The accelerator has been verified on a Xilinx ZCU106 development board and synthesized on both 45 nm and 7 nm Standard-Cell technologies.
Suggested Citation
Stefano Di Matteo & Luca Baldanzi & Luca Crocetti & Pietro Nannipieri & Luca Fanucci & Sergio Saponara, 2021.
"Secure Elliptic Curve Crypto-Processor for Real-Time IoT Applications,"
Energies, MDPI, vol. 14(15), pages 1-20, August.
Handle:
RePEc:gam:jeners:v:14:y:2021:i:15:p:4676-:d:606699
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jeners:v:14:y:2021:i:15:p:4676-:d:606699. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.