Academia.eduAcademia.edu

Elliptic Curve Cryptography Engineering

2006, Proceedings of the …

Abstract

In recent years, elliptic curve cryptography (ECC) has gained widespread exposure and acceptance, and has already been included in many security standards. Engineering of ECC is a complex, interdisciplinary research field encompassing such fields as mathematics, computer science, and electrical engineering. In this paper, we survey ECC implementation issues as a prominent case study for the relatively new discipline of cryptographic engineering. In particular, we show that the requirements of efficiency and security considered at the implementation stage affect not only mere low-level, technological aspects but also, significantly, higher level choices, ranging from finite field arithmetic up to curve mathematics and protocols.

Key takeaways

  • What makes elliptic curves particularly attractive for cryptographic applications [8], [9] is that the discrete logarithm problem in elliptic curve groups is computationally hard.
  • In fact, the criteria of reusability and scalability are of fundamental importance for the design of cryptographic blocks, since the operand sizes, usually much larger than in normal applications, may significantly change depending on the required level of security or the specific cryptosystem.
  • SPA can be used to break cryptographic implementations in which the execution path depends on the data being processed, similar to timing attacks.
  • ECC is based on the discrete logarithm problem applied to the Abelian group formed by the points of an elliptic curve over a finite field.
  • In fact, different applications require different cryptographic schemes and in turn involve the underlying elliptic curve operations in different ways.