Algorithm on One’s Complement for F-Scalar Multiplication in ECC for W/S Network
Abstract
Elliptic curve cryptography (ECC) is having good potential for wireless sensor network security due to its smaller key size and its high strength of security. But there is a room to reduce the key calculation time to meet the potential applications, in particular for wireless sensor networks (WSN). Scalar multiplication is the operation in elliptical curve cryptography which takes 80% of key calculation time on wireless sensor network motes. This research proposes algorithm based on 1’s complement subtraction to represent scalar in scalar multiplication which offer less Hamming weight and will remarkably improve the computational efficiency of scalar multiplication.
Keywords
Full Text:
PDFReferences
F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422,2002.
C. Chung-Kuo, J. M. Overhage, and J. Huang, "An application of sensor networks for syndromic surveillance," 2005, pp. 191-196.
G. Werner-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees,and M. Welsh, "Deploying a wireless sensor network on an active volcano," IEEE Internet Computing, vol. 10, pp. 18-25, 2006.
B. Sinopoli, C. Sharp, L. Schenato, S. Schaffert, and S. S. Sastry,"Distributed control applications within sensor networks," Proceedings of the IEEE, vol. 91, pp. 1235-1246, 2003.
D. L. Stephens, Jr. and A. J. Peurrung, "Detection of moving radioactive sources using sensor networks," Nuclear Science, IEEE Transactions on,vol. 51, pp. 2273-2278, 2004.
P. Sikka, P. Corke, P. Valencia, C. Crossman, D. Swain, and G. Bishop-Hurley, "Wireless ad hoc sensor and actuator networks on the farm,"2006, pp. 492-499.
Z. Feng, "Wireless sensor networks: a new computing platform for tomorrow's Internet," 2004, pp. I-27 Vol.1.
F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and E. Cayirci,"A Survey on Sensor Networks” in IEEE Communication Magazine.vol. 40, August 2002, pp. 102-116.
V. S. Miller, "Use of Elliptic Curves in Cryptography," in Advances in Cryptology - CRYPTO '85: Proceedings. vol. 218: Springer-Verlag,1986, pp. 417-426.
N.Koblitz, "Elliptic Curve Cryptosystems," Mathematics of Computation, vol. 48, pp. 203-209, 1987.
J. Lopez and R. Dahab., " An overview of elliptic curve cryptography,"Technical report ,Institute of Computing, Sate University of Campinas,Sao Paulo, Brazil, May 2000.
K. Lauter, "The advantages of elliptic curve cryptography for wireless security," Wireless Communications, IEEE [see also IEEE Personal Communications], vol. 11, pp. 62-67, 2004.
H. Wang, B. Sheng, and Q. Li, "Elliptic curve cryptography-based access control in sensor networks," Int. J. Security and Networks,, vol. 1,pp. 127-137, 2006.
N. Gura, A. Patel, and A. Wander, "Comparing elliptic curve cryptography and RSA on 8-bit CPUs," in Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES)August 2004.
http://csrc.nist.gov/CryptoToolkit/dss/ecdsa/NISTReCur.pdf."
D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography," in 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON 2004)2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks(SECON 2004), 2004, pp. 71-80.
Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography vol.265, 1999.
D. Hankerson, J. L. Hernandez, and A. Menezes, "Software Implementation of Elliptic Curve Cryptography over Binary Fields,CHES," 2000.
Angelo C Gillie, “Binary Arithmetic and Boolean algebra,” McGRAWHILL Book Company, 1965. pp53.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.