Academia.eduAcademia.edu

Binary Edwards Curves

description12 papers
group0 followers
lightbulbAbout this topic
Binary Edwards curves are a type of elliptic curve defined over binary fields, characterized by their efficient arithmetic operations and resistance to certain cryptographic attacks. They are used in cryptography for secure key exchange and digital signatures, offering advantages in performance and security compared to traditional elliptic curves.
lightbulbAbout this topic
Binary Edwards curves are a type of elliptic curve defined over binary fields, characterized by their efficient arithmetic operations and resistance to certain cryptographic attacks. They are used in cryptography for secure key exchange and digital signatures, offering advantages in performance and security compared to traditional elliptic curves.

Key research themes

1. How can Binary Edwards Curves (BEC) be efficiently implemented on resource-constrained hardware with resistance to side-channel attacks?

This theme addresses designing hardware architectures for Binary Edwards Curves that optimize point multiplication computations in terms of latency, area, and security. BECs are favored for their unified formulas that inherently resist simple power analysis (SPA) attacks, making them suitable for IoT and embedded devices. Research focuses on pipeline architectures, low-complexity finite field multipliers, and radix-based multiplier units to expedite elliptic curve point multiplication while minimizing resource usage and enhancing side-channel attack mitigation.

Key finding: Introduces a low-complexity FPGA architecture for BEC point multiplication that balances throughput and area using digital parallel least significant multiplier with advanced scheduling, achieving adaptability but lacking... Read more
Key finding: Proposes a low-complexity BEC point multiplication design over GF(2^233) optimized by reducing instruction-level complexity and minimizing storage requirements; incorporates a 32-bit digit-parallel finite field multiplier to... Read more
Key finding: Presents a novel radix-4-based multiplier hardware architecture implementing Non-Adjacent Form (NAF) algorithms on BEC for efficient point multiplication; achieves reduced additions and subtractions, which decreases... Read more

2. What algorithmic and architectural strategies improve performance and flexibility of hardware elliptic curve cryptography processors supporting multiple curve forms including Edwards and Weierstrass curves?

This theme explores unified hardware designs capable of supporting diverse elliptic curve forms (Weierstrass, Edwards, and Huff) on FPGA platforms. Achieving trade-offs between area, speed, and security involves modular arithmetic optimizations, efficient storage, and flexible point multiplication algorithms such as Montgomery ladder and Double-and-Add. The goal is to attain high-performance, low-area cryptographic modules adaptable to varying security requirements and resistant to side-channel attacks.

by Muhammad Arif and 
1 more
Key finding: Develops a unified FPGA architecture supporting Weierstrass, Edwards, and Huff curves by employing two point multiplication algorithms (Montgomery ladder for Weierstrass and Edwards; Double-and-Add for Huff) along with an... Read more

3. How can isogenies and curve transformations among Edwards, Hessian, and other curve forms optimize elliptic curve cryptographic operations?

Research in this theme focuses on deriving explicit formulas for isogenies on different elliptic curve models beyond the classical Weierstrass form, particularly twisted Hessian and Edwards curves. By obtaining minimal operation counts for kernel and input point processing, these transformations facilitate faster computations, potential reductions in side-channel vulnerability, and novel cryptographic protocol constructions, thereby expanding the flexibility and efficiency of elliptic curve cryptography implementations.

Key finding: Derives explicit low-cost isogeny formulas for twisted Hessian elliptic curves, minimizing base field operations during kernel and input point evaluations; notably, X-affine formulas achieve the lowest cost among compared... Read more

All papers in Binary Edwards Curves

This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
Public key cryptographic schemes are vastly used to ensure confidentiality, integrity, authentication and nonrepudiation. Schmidt-Samoa cryptosystem (SSC) is a public key cryptosystem, which depends on the difficulty of large integer... more
Elliptic Curves Cryptosystem (ECC) has been introduced as a secure and efficient public key algorithm. A number of elliptic curves representations have been presented, such as Standard (Weierstrass), Edwards, Binary Edwards, Montgomery... more
Elliptic Curves Cryptosystem (ECC) has been introduced as a secure and efficient public key algorithm. A number of elliptic curves representations have been presented, such as Standard (Weierstrass), Edwards, Binary Edwards, Montgomery... more
RSA Cryptography is a well-known example of public key cryptographic algorithms that involves robust encryption/decryption processes. In this paper, a microcontroller based RSA is designed and proposed. Arduino Mega2560R3 microcontroller... more
Elliptic Curve Cryptosystem (ECC) has been introduced among the most secure public key algorithms. ECC depends on modular arithmetic operations to perform its computations. Modular inversion is main and most costly operation modular... more
Elliptic Curve Cryptosystem (ECC) has been introduced among the most secure public key algorithms. ECC depends on modular arithmetic operations to perform its computations. Modular inversion is main and most costly operation modular... more
Modular inversion operation is known to be the most time consuming operation in ECC field arithmetic computations. In addition, Many ECC designs that use projective coordinates over GF (p) have not considered different factors that affect... more
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multiplication level and lower point operations level. We combine the inherited parallelism in both levels to reduce the delay and improve... more
Elliptic Curve Cryptosystem (ECC) has been introduced among the most secure public key algorithms. ECC depends on modular arithmetic operations to perform its computations. Modular inversion is main and most costly operation modular... more
‫ــــ‬ Modular inversion operation is known to be the most time consuming operation in ECC field arithmetic computations. In addition, Many ECC designs that use projective coordinates over GF (p) have not considered different factors that... more
Hardware acceleration of cryptographic algorithms is beneficial because considerable performance improvements can be attained compared to software implementations. Thus, hardware implementations can be used in critical applications... more
Abstract‫ـــ‬ Elliptic Curve Cryptosystem (ECC) has been introduced among the most secure public key algorithms. ECC depends on modular arithmetic operations to perform its computations. Modular inversion is main and most costly operation... more
ABSTRACT‫ــــ‬ Modular inversion operation is known to be the most time consuming operation in ECC field arithmetic computations. In addition, Many ECC designs that use projective coordinates over GF (p) have not considered different... more
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multiplication level and lower point operations level. We combine the inherited parallelism in both levels to reduce the delay and improve... more
This paper presents a processor architecture for elliptic curve cryptography computations over GF(p). The speed to compute the Elliptic-curve point multiplication over the prime fields GF(p) is increased by using the maximum degree of... more
As a public key cryptography, Elliptic Curve Cryptography (ECC) is well known to be the most secure algorithms that can be used to protect information during the transmission. ECC in its arithmetic computations suffers from modular... more
by A. Tenca and 
1 more
This paper presents an algorithm and architecture for a scalable radix-4 multiplier that makes use of two types of digit recoding in order to generate an efficient solution. Experimental results are shown to demonstrate that the proposed... more
37 chain is used to prove that the average Hamming weight of the proposed integer representation is 13 3n . Our analysis shows that using the proposed scalar multiplication algorithm, the computation cost (the number of required point... more
Embedded systems find applications in fields such as defense, communications, industrial automation and many more. For majority of these applications, security is a vital issue. Cryptography plays an important role in providing data... more
Elliptic curves cryptography (ECC) algorithm is well-known powerful approach of implementing public key cryptography created by Victor Miller and Neil Koblitz. ECC is a modular arithmetic based algorithm that includes modular inversion... more
Arithmetic operations involved in ECC computation suffer from modular inversion operation. Modular inversion is known to be the most time consuming operation performed by the ECC crypto-processor. Inversion operations can be replaced by... more
Modular inversion operation is known to be the most time consuming operation in ECC field arithmetic computations. In addition, Many ECC designs that use projective coordinates over GF (p) have not considered different factors that affect... more
Elliptic Curve Cryptosystem (ECC) has been introduced among the most secure public key algorithms. ECC depends on modular arithmetic operations to perform its computations. Modular inversion is main and most costly operation modular... more
Download research papers for free!