Supporting Symmetric 128-bit AES in Networked Embedded Systems: An Elliptic Curve Key Establishment Protocol-on-Chip
نویسندگان
چکیده
The secure establishment of cryptographic keys for symmetric encryption via key agreement protocols enables nodes in a network of embedded systems and remote agents to communicate securely in an insecure environment. In this paper, we propose a pure hardware implementation of a key agreement protocol, which uses the elliptic curve Diffie-Hellmann and digital signature algorithms and enables two parties, a remote agent and a networked embedded system, to establish a 128-bit symmetric key for encryption of all transmitted data via the advanced encryption scheme (AES). The resulting implementation is a protocol-on-chip that supports full 128-bit equivalent security (PoC-128). The PoC-128 has been implemented in an FPGA, but it can also be used as an IP within different embedded applications. As 128-bit security is conjectured valid for the foreseeable future, the PoC-128 goes well beyond the state of art in securing networked embedded devices.
منابع مشابه
Next generation security for wireless: elliptic curve cryptography
Scott Vanstone, from Certicom, polemicizes for elliptic curve cryptography. He advances his company's view that ECC is the next generation of public-key cryptography for wireless. Recent cryptanalytic advances have caused increased discussion about public key sizes and the security required. One particular advance was put forward this past February by Dr Adi Shamir, the 'S' in RSA, which raises...
متن کاملKey Establishment and Trustful Communication for the Internet of Things
This work describes a practical solution for the problem of cryptographic key establishment and secure communication in the context of the Internet of Things, in which computational e ciency is a fundamental requirement. A symmetric-key establishment protocol based on AES, Poly1305AES, time synchronization, Elliptic Curve Di e-Hellman and sensor IDs is proposed to achieve data con dentiality, a...
متن کاملA Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines
The Elliptic Curve Digital Signature Algorithm (ECDSA) and the Advanced Encryption Standard (AES) are two of the most popular cryptographic algorithms used worldwide. In this paper, we present a hardware implementation of a low-resource cryptographic processor that provides both digital signature generation using ECDSA and encryption/decryption services using AES. The implementation of ECDSA is...
متن کاملThe Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks (Extended Abstract)
Wireless sensor nodes generally face serious limitations in terms of computational power, energy supply, and network bandwidth. Therefore, the implementation of effective and secure techniques for setting up a shared secret key between sensor nodes is a challenging task. In this paper we analyze and compare the energy cost of two different protocols for authenticated key establishment. The firs...
متن کاملA Fast and Compact FPGA Implementation of Elliptic Curve Cryptography Using Lambda Coordinates
Elliptic curve cryptography (ECC) provides high security with shorter keys than other public-key cryptosystems and it has been successfully used in security critical embedded systems. We present an FPGA-based coprocessor that communicates with the host processor via a 32-bit bus. It implements ECC over an elliptic curve that offers roughly 128-bit security. It is the first hardware implementati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Emb. Sys.
دوره 2007 شماره
صفحات -
تاریخ انتشار 2007