DocumentCode
604242
Title
A performance comparison of elliptic curve scalar multiplication algorithms on smartphones
Author
Reyes, A.C. ; Castillo, A.K.V. ; Morales-Sandoval, Miguel ; Diaz-Perez, Arturo
Author_Institution
Polytech. Univ. of Victoria, Ciudad Victoria, Mexico
fYear
2013
fDate
11-13 March 2013
Firstpage
114
Lastpage
119
Abstract
This work presents an evaluation of different software implementations of algorithms to compute the most demanding operation in cryptographic schemes based on Elliptic Curve Cryptography (ECC), the scalar multiplication. Five different methods were studied, including traditional and more sophisticated methods for elliptic curve cryptography defined over prime and binary fields. For evaluation, the key generation algorithm in ECC consisting on a single scalar multiplication was implemented on a P500h LG smarthphone, which includes an ARM processor running at 600MHz. Both execution time and memory usage was evaluated. It was found that in general, scalar multiplication runs 8 times faster for ECC defined over prime fields, being the NAF the best performer method. For ECC over binary fields, the best performer method was wNAF. The results presented in this work could help a designer to select the most appropriate method when implementing ECC-based cryptographic schemes such as encryption or digital signatures on mobile devices like smartphones, meeting implementation requirements in terms of execution time and memory usage.
Keywords
digital signatures; microprocessor chips; performance evaluation; public key cryptography; smart phones; ARM processor; ECC-based cryptographic schemes; P500h LG smarthphone; binary fields; cryptographic schemes; digital signatures; elliptic curve cryptography; elliptic curve scalar multiplication algorithms; encryption; execution time; key generation algorithm; memory usage; mobile devices; scalar multiplication; single scalar multiplication; software implementations; wNAF; Digital signatures; Elliptic curve cryptography; Elliptic curves; Memory management; Polynomials; Standards; elliptic curve cryptography; encryption; finite fields; scalar multiplication;
fLanguage
English
Publisher
ieee
Conference_Titel
Electronics, Communications and Computing (CONIELECOMP), 2013 International Conference on
Conference_Location
Cholula
Print_ISBN
978-1-4673-6156-9
Type
conf
DOI
10.1109/CONIELECOMP.2013.6525770
Filename
6525770
Link To Document