DocumentCode :
604242
Title :
A performance comparison of elliptic curve scalar multiplication algorithms on smartphones
Author :
Reyes, A.C. ; Castillo, A.K.V. ; Morales-Sandoval, Miguel ; Diaz-Perez, Arturo
Author_Institution :
Polytech. Univ. of Victoria, Ciudad Victoria, Mexico
fYear :
2013
fDate :
11-13 March 2013
Firstpage :
114
Lastpage :
119
Abstract :
This work presents an evaluation of different software implementations of algorithms to compute the most demanding operation in cryptographic schemes based on Elliptic Curve Cryptography (ECC), the scalar multiplication. Five different methods were studied, including traditional and more sophisticated methods for elliptic curve cryptography defined over prime and binary fields. For evaluation, the key generation algorithm in ECC consisting on a single scalar multiplication was implemented on a P500h LG smarthphone, which includes an ARM processor running at 600MHz. Both execution time and memory usage was evaluated. It was found that in general, scalar multiplication runs 8 times faster for ECC defined over prime fields, being the NAF the best performer method. For ECC over binary fields, the best performer method was wNAF. The results presented in this work could help a designer to select the most appropriate method when implementing ECC-based cryptographic schemes such as encryption or digital signatures on mobile devices like smartphones, meeting implementation requirements in terms of execution time and memory usage.
Keywords :
digital signatures; microprocessor chips; performance evaluation; public key cryptography; smart phones; ARM processor; ECC-based cryptographic schemes; P500h LG smarthphone; binary fields; cryptographic schemes; digital signatures; elliptic curve cryptography; elliptic curve scalar multiplication algorithms; encryption; execution time; key generation algorithm; memory usage; mobile devices; scalar multiplication; single scalar multiplication; software implementations; wNAF; Digital signatures; Elliptic curve cryptography; Elliptic curves; Memory management; Polynomials; Standards; elliptic curve cryptography; encryption; finite fields; scalar multiplication;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electronics, Communications and Computing (CONIELECOMP), 2013 International Conference on
Conference_Location :
Cholula
Print_ISBN :
978-1-4673-6156-9
Type :
conf
DOI :
10.1109/CONIELECOMP.2013.6525770
Filename :
6525770
Link To Document :
بازگشت