Title :
Performance evaluation of ECC scalar multiplication using parallel modular algorithms on mobile devices
Author :
Vanderlei de Arruda, Tiago ; Venturini, Yeda Regina ; Sakata, Tiemi Christine
Author_Institution :
Comput. Dept., Fed. Univ. of Sao Carlos, São Carlos, Brazil
Abstract :
Mobile devices, such as smartphones, allow people around the world to access a huge amount of online applications anywhere and anytime. Elliptic Curve Cryptography (ECC) algorithm can be used in mobile devices to trust the access to these applications. Scalar multiplication is the main and most expensive operation in ECC and its cost is directly related to the size of the key used. It is composed of a lot of modular arithmetic operations (addition, subtraction, squaring, multiplication and inversion), defined by the coordinate system used. Using the short Weierstrass Jacobian coordinate system, the modular multiplication and squaring are the most costly operations performed in our experiments. In this paper we analyze the performance of scalar multiplication using a variety of sequential and parallel modular multiplication algorithms with standardized NIST curves. To predict the timings for highorder curves, it is used a 1536-bit pairing-friendly curve available on RELIC. Experiments were performed on a SabreLite IMX6Quad board with a quad-core ARM cortex A9 (ARMv7 architecture) processor, which allows the analysis of these scalar multiplications on a mobile device architecture. Results show that Bipartite 2th timings were faster than the sequential ones for 1536-bit curves. Bipartite timings were strictly close to the best sequential timing for 521 bits, indicating that for a not too much longer key, parallel algorithms´ timings are capable to overcome the sequential ones.
Keywords :
mobile computing; parallel algorithms; public key cryptography; ECC algorithm; ECC scalar multiplication; SabreLite IMX6Quad board; addition operation; bipartite timings; elliptic curve cryptography; inversion operation; mobile devices; modular arithmetic operations; modular multiplication algorithms; multiplication operation; parallel modular algorithms; performance evaluation; quad-core ARM cortex A9 processor; short Weierstrass Jacobian coordinate system; smart phones; squaring operation; subtraction operation; Algorithm design and analysis; Elliptic curve cryptography; Elliptic curves; Mobile handsets; Parallel algorithms; Timing;
Conference_Titel :
Privacy, Security and Trust (PST), 2015 13th Annual Conference on
Conference_Location :
Izmir
DOI :
10.1109/PST.2015.7232967