Javascript must be enabled to continue!
Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
View through CrossRef
The Internet of Things’ (IoT) market is expected to grow exponentially at the global level in the coming years, due to the proliferation of more reliable and faster networks resulting from the extensive rollout of 5 to 10 G mobile networks. By 2025, it is expected that worldwide projection of IoT connected devices will be pegged at 30.9 billion units. Despite the potential benefits of the new technology, security in IoT is a major threat. According to HP, 70% of IoT devices are vulnerable to sniffing attacks and reliable solution is yet to be found. The standard cryptographic algorithms such as RSA and AES provide good security but their utilization in IoT is questionably due to hardware and energy constraints for computationally expensive encryption schemes. However, elliptic curve- based cryptography, a recent paradigm in public key cryptography, achieves the same level of security with smaller key sizes. On the other hand, the total score of performance of an elliptic curve-based cryptosystem depends largely on the efficiency of the arithmetic operations performed in it. It is against this background that this paper proposes efficient elliptic curve arithmetic for implementing ECC based schemes suitable for IoT systems implementations. Elliptic curve point arithmetic implementations in projective coordinate systems over binary extension fields introduce higher efficiencies in software. In this regard, this paper has proposed an improved López-Dahab point arithmetic methods on non-supersingular elliptic curves over . The results show 69.20% improvement in Point Doubling, 44.68% in Point Addition and the scalar point multiplication execution time is decreased by 48.80%.
Sciencedomain International
Title: Efficient Elliptic Curve Arithmetic for Lightweight Cryptographic Schemes for IoT Applications
Description:
The Internet of Things’ (IoT) market is expected to grow exponentially at the global level in the coming years, due to the proliferation of more reliable and faster networks resulting from the extensive rollout of 5 to 10 G mobile networks.
By 2025, it is expected that worldwide projection of IoT connected devices will be pegged at 30.
9 billion units.
Despite the potential benefits of the new technology, security in IoT is a major threat.
According to HP, 70% of IoT devices are vulnerable to sniffing attacks and reliable solution is yet to be found.
The standard cryptographic algorithms such as RSA and AES provide good security but their utilization in IoT is questionably due to hardware and energy constraints for computationally expensive encryption schemes.
However, elliptic curve- based cryptography, a recent paradigm in public key cryptography, achieves the same level of security with smaller key sizes.
On the other hand, the total score of performance of an elliptic curve-based cryptosystem depends largely on the efficiency of the arithmetic operations performed in it.
It is against this background that this paper proposes efficient elliptic curve arithmetic for implementing ECC based schemes suitable for IoT systems implementations.
Elliptic curve point arithmetic implementations in projective coordinate systems over binary extension fields introduce higher efficiencies in software.
In this regard, this paper has proposed an improved López-Dahab point arithmetic methods on non-supersingular elliptic curves over .
The results show 69.
20% improvement in Point Doubling, 44.
68% in Point Addition and the scalar point multiplication execution time is decreased by 48.
80%.
Related Results
Cryptographic Techniques for Secure IoT Data Transmission
Cryptographic Techniques for Secure IoT Data Transmission
The rapid expansion of the Internet of Things (IoT) has revolutionized industries by enabling interconnected devices to communicate and exchange data seamlessly. However, the trans...
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Resource-constrained devices such as wireless sensors and Internet of Things (IoT) devices have become ubiquitous in our digital ecosystem. These devices generate and handle a majo...
A NEW PROPOSED LIGHTWEIGHT CIPHER
A NEW PROPOSED LIGHTWEIGHT CIPHER
Modern cryptography algorithm development has favored hardware optimization in computer systems. This is especially important for fitting cryptographic protocols onto devices with ...
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
Pengaruh IOT terhadap Kemudahan Akses Penyebaran Agama Islam di Era Globalisasi
In the era of globalization, Internet of Things (IoT) technology has changed the way information is disseminated and accessed, including in the context of spreading Islam. This stu...
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
IoT-Based Multi-Sensor Healthcare Architectures and a Lightweight-Based Privacy Scheme
IoT-Based Multi-Sensor Healthcare Architectures and a Lightweight-Based Privacy Scheme
Health 4.0 is a new promising addition to the healthcare industry that innovatively includes the Internet of Things (IoT) and its heterogeneous devices and sensors. The result is t...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...

