TAILIEUCHUNG - ECC-based Wireless Authentication Protocol on an ARM Microprocessor

In this paper, we present the results of our implementation of elliptic curve cryptography (ECC) over the field GF (p) on an 80-MHz, 32-bit ARM microprocessor. We have produced a practical software library which supports variable length implementation of the elliptic curve digital signature algorithm (ECDSA). | High-Speed Implementation of an ECC-based Wireless Authentication Protocol on an ARM Microprocessor M. Aydos T. Yanik and C. K. Koc Electrical Computer Engineering Oregon State University Owen Hall 220 Corvallis Oregon 97331 USA Tel 1 541 737 4853 Fax 1 541 737 8377 aydos yanik koc @ Abstract In this paper we present the results of our implementation of elliptic curve cryptography ECC over the field GF p on an 80-MHz 32-bit ARM microprocessor. We have produced a practical software library which supports variable length implementation of the elliptic curve digital signature algorithm ECDSA . We implemented the ECDSA and a recently proposed ECC-based wireless authentication protocol using the library. Our timing results show that the 160-bit ECDSA signature generation and verification operations take around 46 ms and 94 ms respectively. With these timings the execution of the ECC-based wireless authentication protocol takes around 140 ms on the ARM7TDMI processor which is a widely used low-power core processor for wireless applications. 1 Introduction The rapid progress in wireless communication systems personal communication systems and smartcard technologies has brought new opportunities and challenges to be met by engineers and researchers working on the security aspects of the new communication technologies. Public-key cryptography offers robust solutions to many of the existing problems in communication systems however excessive computational demands on-line memory code size and speed have made the use of public key cryptography limited particularly on wireless communication systems. The implementation of public-key cryptography on server and client platforms rarely brings problems due to the availability of high-speed processors and extensive memory space. However in restricted hardware environments with limited computational power and small memory . smartcards and cellular phones we meet more challenges. The integration of the public-key .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.