Efficient Implementation of Elliptic Curve Cryptography on DSP for Underwater Sensor Networks

نویسندگان

  • Hai Yan
  • Zhijie Jerry Shi
  • Yunsi Fei
چکیده

As emerging sensor networks are normally deployed in the field and thus vulnerable to many types of attacks, it is critical to implement cryptographic algorithms in sensor nodes to provide security services. Public-key algorithms, such as RSA and Elliptic Curve Cryptography (ECC), have been widely used for security purposes like digital signature and authentication. In resource-constrained sensor networks, ECC is more suitable than other public-key algorithms based on large integer fields because it provides similar security strength with shorter keys and thus is more computation-efficient. However, even ECC is slow on many sensor nodes. In underwater sensor networks (UWSNs), sensor nodes communicate with each other through acoustic channels. Because more complicated algorithms are needed to encode and decode acoustic signals transmitted through the noisy underwater channels, many acoustic modems include a DSP to meet the performance requirement of underwater communications. In this paper, we study the implementation of ECC on DSPs. We optimize the SECG elliptic curves secp160r1 and secp224r1 on a TMS320C6416 DSP board from Texas Instruments. In our implementation, it takes 0.81 ms to compute a random scalar point multiplication for secp160r1, an order of magnitude faster than the communication algorithm decoding a data block. Therefore, we believe that it is feasible to adopt ECC in UWSNs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks

One of the huge problems for security in sensor networks is the lack of resources. Typical sensor nodes such as the quite popular MICA and MICA2 Motes from UC Berkeley [1] are based on a microcontroller architecture with only a few KBytes of memory and severe limited computing ability. Strong publickey cryptography is therefore commonly seen as infeasible on such devices. In contrast to this pr...

متن کامل

Efficient implementation of elliptic curve cryptography in wireless sensors

The deployment of cryptography in sensor networks is a challenging task, given the limited computational power and the resource-constrained nature of the sensoring devices. This paper presents the implementation of elliptic curve cryptography in the MICAz Mote, a popular sensor platform. We present optimization techniques for arithmetic in binary fields, including squaring, multiplication and m...

متن کامل

The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve

In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind  digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...

متن کامل

Crypto for Tiny Objects

This work presents the first known implementation of elliptic curve cryptography for sensor networks, motivated by those networks’ need for an efficient, secure mechanism for shared cryptographic keys’ distribution and redistribution among nodes. Through instrumentation of UC Berkeley’s TinyOS, this work demonstrates that secret-key cryptography is already viable on the MICA2 mote. Through anal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009