FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things

Kamalakannan, V. and Tamilselvan, S. (2018) FPGA Implementation of Elliptic Curve Cryptoprocessor for Perceptual Layer of the Internet of Things. EAI Endorsed Transactions on Security and Safety, 5 (15). e4. ISSN 2032-9393

[thumbnail of eai.15-10-2018.155739.pdf]
Available under License Creative Commons Attribution No Derivatives.

Download (1MB) | Preview


Today’s developing era data and information security plays an important role in unsecured communication between Internet of Things (IoT) elements. In IoT, data are transmitted in plaintext for many reasons. One of the most common reason is the availability of hardware. Many IoT products are inexpensive components with limited memory and computational resources. Such devices might be unable to support the computationally intense cryptographic functions of asymmetrical cryptography. If designers considered the privacy implications of unencrypted data, they have limited options for encryption because of the hardware platform. Therefore the designers have to create their own security protocols or implement stripped-down versions of existing security protocols. The second option has a better chances. Evidence recommends such a modified protocol would run efficiently on small devices. Elliptic Curve Cryptography (ECC) is used to ensure complete protection against the security risks such as confidentiality, integrity, privacy and authentication by implementing an Elliptic Curve Cryptoprocessor. The work focuses on high-performance Elliptic Curve Cryptoprocessor design, optimized for Field Programmable Gate Array (FPGA) implementation, using the concept of asymmetric and hash algorithms. A novel cryptographic algorithm consisting of matrix mapping methodology and hidden generator point theory is to be applied for encryption/decryption between the sender and receiver whereas Elliptic Curve Digital Signature Algorithm (ECDSA) designed using Keccak Secured Hash Algorithm (SHA) algorithm is applied for the validation of the encrypted data. The proposed Cryptoprocessor operates at a minimum period of 6.980 ns and maximum frequency of 143.276 MHz. This work focuses on the practicability of public key cryptography implementation for devices connected in the perceptual layer of IoT.

Item Type: Article
Uncontrolled Keywords: Internet of Things, Perceptual layer, Wireless Sensor Network, Elliptical Curve Cryptography, Elliptic Curve Digital Signature Algorithm
Subjects: H Social Sciences > H Social Sciences (General)
Q Science > QA Mathematics > QA75 Electronic computers. Computer science
QA75 Electronic computers. Computer science
Depositing User: EAI Editor IV
Date Deposited: 26 Mar 2021 13:52
Last Modified: 26 Mar 2021 13:52
URI: https://eprints.eudl.eu/id/eprint/2090

Actions (login required)

View Item
View Item