Loading [MathJax]/extensions/MathMenu.js
Analysis and Implementation of ECC Algorithm in Lightweight Device | IEEE Conference Publication | IEEE Xplore

Analysis and Implementation of ECC Algorithm in Lightweight Device


Abstract:

Cryptography is a process that converts ordinary text into cipher text and vice-versa. It is not only protecting the data from theft, but can also be used for user authen...Show More

Abstract:

Cryptography is a process that converts ordinary text into cipher text and vice-versa. It is not only protecting the data from theft, but can also be used for user authentication. The large number of slices increases the size of devices. In order to reduce the number of slices, lightweight algorithms are used. Achieving high speed and less memory space are the key issues in lightweight devices using conventional cryptographic algorithms. Hence Elliptic Curve Cryptographic Algorithm (ECC) is chosen, as its key size is very less and secure compared to conventional cryptographic algorithms. Elliptic-curve cryptography is a lightweight public-key cryptographic algorithm as it requires smaller keys compared to private-key cryptographic algorithms. In this paper, an ECC algorithm over Galois Field GF (23) for lightweight systems is proposed where the main focus is on reduction in area and the simulation and synthesis results of 8-bit ECC crypto processor are discussed. Therefore, a compact design for ECC crypto processor applicable to lightweight devices can be developed.
Date of Conference: 04-06 April 2019
Date Added to IEEE Xplore: 25 April 2019
ISBN Information:
Conference Location: Chennai, India
Dept. of ECE, SSN Coll. of Eng., Chennai, Tamil Nadu, IN
Dept. of ECE, SSN Coll. of Eng., Chennai, Tamil Nadu, IN
Dept. of ECE, SSN Coll. of Eng., Chennai, Tamil Nadu, IN

I. Introduction

MODERN technology has evolved hops and bounds over the years. From hand written letters to telephonic operators manually connecting the calls to cellular phones, video calls to smart phones, the development has been tremendous[1]-[3]. But with the advent of those new innovations, the susceptibility of the users to an attack of privacy has also increased. Thus, the necessity to have more security and reliable forms of communication is now a need more than ever[4]-[7]. Cryptography plays a major role in communication because it not only helps in protection of data, but also ensures the integrity and validation of messages. Cryptography basically deals with encryption and decryption[8]-[10]. [11]-[12] Encryption is the process of converting a plaintext message to a cipher text message and vice-versa is applicable for decryption. [12] Cryptography consists of two types, Asymmetric key cryptography which is also known as public key cryptography and symmetric key cryptography which is also known as private key cryptography.

Dept. of ECE, SSN Coll. of Eng., Chennai, Tamil Nadu, IN
Dept. of ECE, SSN Coll. of Eng., Chennai, Tamil Nadu, IN
Dept. of ECE, SSN Coll. of Eng., Chennai, Tamil Nadu, IN
Contact IEEE to Subscribe

References

References is not available for this document.