Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices

Erich Wenger, Martin Feldhofer, Norbert Felber

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Hardware implementations for contactless devices like NFC or RFID tags face fierce constraints concerning the chip area and the power consumption. In this work, we present the low-resource hardware implementation of a 16-bit microprocessor that is able to efficiently perform Elliptic Curve Cryptography (ECC). The highly optimized design features the calculation of the Elliptic Curve Digital Signature Algorithm (ECDSA) using the standardized NIST curve in the finite field . We carefully selected the underlying algorithms to minimize the required memory resources while also keeping the required runtime within reasonable limits. In total, the microprocessor requires a chip area of 11686 gate equivalents and performs the ECDSA within 1377k clock cycles, which is to our knowledge the smallest implementation of ECDSA using the NIST P-192 curve published so far.
Originalspracheenglisch
TitelInformation Security Applications
Untertitel 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
ErscheinungsortBerlin; Heidelberg
Herausgeber (Verlag)Springer
Seiten92-106
ISBN (Print)978-3-642-17954-9
DOIs
PublikationsstatusVeröffentlicht - 2010
Veranstaltung11th International Workshop on Information Security Applications: WISA 2010 - Ramada Plaza Jeju Hotel, Jeju Island, Südkorea
Dauer: 24 Aug. 201026 Aug. 2010

Publikationsreihe

NameLecture Notes in Computer Science
Herausgeber (Verlag)Springer
Band6513

Konferenz

Konferenz11th International Workshop on Information Security Applications
KurztitelWISA
Land/GebietSüdkorea
OrtJeju Island
Zeitraum24/08/1026/08/10

Fields of Expertise

  • Information, Communication & Computing

Fingerprint

Untersuchen Sie die Forschungsthemen von „Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices“. Zusammen bilden sie einen einzigartigen Fingerprint.
  • PIT - Pirvacy in the Internet of Things

    Wenger, E., Feldhofer, M., Hutter, M., Aigner, M. J., Dominikus, S., Posch, K. & Schmidt, J.

    1/04/1031/07/12

    Projekt: Forschungsprojekt

  • RFID Security

    Wenger, E., Hutter, M., Oswald, M. E., Posch, K., Plos, T., Herbst, C., Schmidt, J., Feldhofer, M., Szekely, A., Dominikus, S., Aigner, M. J., Kirschbaum, M., Medwed, M. & Posch, R.

    1/01/0515/07/19

    Projekt: Arbeitsgebiet

  • VLSI Design

    Medwed, M., Wenger, E., Aigner, M. J., Posch, K., Hutter, M., Kirschbaum, M., Schmidt, J., Posch, R., Dominikus, S., Szekely, A., Feldhofer, M. & Plos, T.

    1/01/9515/07/19

    Projekt: Arbeitsgebiet

Dieses zitieren