Title | ||
---|---|---|
Hyperelliptic Curve Cryptoarchitecture for Fast Execution of Schnorr and Okamoto Authentication Protocols |
Abstract | ||
---|---|---|
A hyper elliptic curve crypto architecture for execution of authentication protocols under hard real time constraints is proposed in this contribution. Tailoring the architecture of the computation platform to the characteristics of the underlying cryptographic protocol enables for short authentication times, minimal hardware usage, while providing a higher level of security compared to today's standard cryptosystems. Due to the low hardware footprint it is ideally suited for integration into embedded systems with limited resources such as electronic control units in automobiles. All cryptographic functionality is strictly bound to an internal processing module thus hiding the complexity of the HECC operations. Automotive access control systems is am example of an application area that can be matched perfectly by the proposed architecture. Experiments show that a massive speed up can be achieved which can be exploited to save power or introduce additional security measures on algorithmic level. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/IPDPS.2011.142 | IPDPS Workshops |
Keywords | Field | DocType |
higher level,authentication protocol,hyperelliptic curve cryptoarchitecture,electronic control unit,okamoto authentication protocols,algorithmic level,low hardware footprint,additional security measure,automotive access control system,minimal hardware usage,fast execution,cryptographic functionality,proposed architecture,cryptography,hardware,cryptographic protocol,authentication,protocols,registers,automotive engineering,embedded system,public key cryptography,embedded systems,access control,hyperelliptic curve,cryptographic protocols | Hash-based message authentication code,Authentication,Cryptographic protocol,Challenge–response authentication,Computer science,Data Authentication Algorithm,Cryptographic primitive,Authentication protocol,Distributed computing,Embedded system,Cryptographic nonce | Conference |
Citations | PageRank | References |
0 | 0.34 | 12 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Alexander Klimm | 1 | 39 | 6.05 |
Sebastian Vogel | 2 | 0 | 1.35 |
Jürgen Becker | 3 | 1894 | 259.42 |