CFP last date
20 December 2024
Reseach Article

Design and Implementation of Secure Stream Cipher based on Elliptic Curves on Time Shared Basis

by K S Lalmohan, Deepthi P P, Sathidevi P S
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 21
Year of Publication: 2013
Authors: K S Lalmohan, Deepthi P P, Sathidevi P S
10.5120/11702-7276

K S Lalmohan, Deepthi P P, Sathidevi P S . Design and Implementation of Secure Stream Cipher based on Elliptic Curves on Time Shared Basis. International Journal of Computer Applications. 68, 21 ( April 2013), 14-21. DOI=10.5120/11702-7276

@article{ 10.5120/11702-7276,
author = { K S Lalmohan, Deepthi P P, Sathidevi P S },
title = { Design and Implementation of Secure Stream Cipher based on Elliptic Curves on Time Shared Basis },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 21 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 14-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number21/11702-7276/ },
doi = { 10.5120/11702-7276 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:28:56.730507+05:30
%A K S Lalmohan
%A Deepthi P P
%A Sathidevi P S
%T Design and Implementation of Secure Stream Cipher based on Elliptic Curves on Time Shared Basis
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 21
%P 14-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper proposes the implementation of a Elliptic Curve (EC) cryptosystem which is aimed to provide secure stream ciphers, hash functions and key exchange in a time shared manner. The design of hardware efficient stream cipher based on elliptic curves proposes the use of point multiplication block on a time sharing basis for providing secure stream ciphers, hash generation and key exchange. The EC point multiplication uses the Gaussian normal bases for field arithmetic. The designs were implemented using Verilog language and the hardware implementation was done using a Field Programmable Gate Array (FPGA) device.

References
  1. M. Ernst, B. Henhapl, S. Klupsch, S. Huss, "FPGA based Hardware Acceleration for Elliptic Curve Public Key Cryptosystems", The Journal of Systems and Software, 70 (2004), Elsevier Publishers, pp. 299-313.
  2. Rivest, R. L. , Shamir, A. , Adleman, L. M. , 1978. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM.
  3. Miller, V. , 1986. Use of elliptic curves in cryptography. In: Williams, H. C. (Ed. ), Advances in Cryptology, Proceedings of the CRYPTO' 85, LNCS 218, Springer-Verlag, pp. 417–426.
  4. Koblitz, N. , 1987. Elliptic curve cryptosystems, Mathematics of Computation 48, pp. 203–209.
  5. Deepthi P. P and Sathidevi P. S, "New Stream Ciphers Based on Elliptic Curve Point Multiplication" Computer Communications 32 (2009), Elsevier Publishers, pp. 25-33.
  6. Hankerson, Menezes and Vanstone, "Guide to Elliptic Curve Cryptography", Springer-Verlag, 2004.
  7. Arash Reyhani-Masoleh, M. Anwar Hasan, Low Complexity Word-Level Sequential Normal Basis Multipliers. IEEE Transactions on Computers, vol. 54 no. 2, pp. 98-110, 2005.
  8. C. K. Koc and B. Sunar, "Low-complexity bit-parallel canonical and normal basis multipliers for a class of finite fields," IEEE Transactions on Computer, Vol. 47, 1998, pp. 353-356.
  9. Chang Hoon Kim, Soonhak Kwon, Chun Pyo Hong, "FPGA implementation of high performance elliptic curve cryptographic processor over GF(2163), Journal of Systems Architecture, 54 (2008), Elsevier Publishers, pp. 893-900.
  10. IEEE 1363, Standard Specifications for Publickey Cryptography, 2000.
  11. Rudolf Lidl and Harald Niederreiter , "Introduction to finite fields and their applications", Cambridge University Press- 2000.
  12. S. Kwon, K. Gaj, C. H. Kim, C. P. Hong, Efficient linear array for multiplication in GF(2m) using a normal basis for elliptic curve cryptography, in: CHES 2004, Lecture Notes in Computer Science, vol. 3156, 2004, pp. 76–91.
  13. A. Menezes, "Elliptic Curve Public Key Cryptosystems", Kluwer academic publishers, 1993.
  14. Henri Cohen and Gerhard Frey, "Handbook of Elliptic and Hyper Elliptic Curve Cryptography", Chapman & Hall/CRC, 2006.
  15. Neal Koblitz, "A Course in Number Theory and Cryptography" Springer 2005, Second Edition.
  16. A. J. Menezes, "Applications of Finite Fields", Kluwer Academic Publishers, Boston, Mass, USA, 1993.
  17. Shuhong Gao , Hendrik W. Lenstra, Jr. , "Optimal normal bases, Designs, Codes and Cryptography, v. 2 n. 4, pp. 315-323, December 1992.
  18. R. C. Mullin, I. M. Onyszchuk, S. A. Vanstone, R. M. Wilson, "Optimal Normal Bases in GF(pn), Discrete Applied Mathematics, v. 22 n. 2, pp. 149-161, February 1989.
  19. Arash Reyhani-Masoleh, Efficient Algorithms and Architectures for Field Multiplication Using Gaussian Normal Bases, IEEE Transactions on Computers, vol. 55, no. 1, pp. 34-47, 2006.
  20. R. Azarderakhsh, A. Reyhani-Masoleh, " A modified low complexity digit-level Gaussian normal basis multiplier", Lecture Notes in Computer Science Volume 6087, 2010, Springer-Verlag Berlin, pp 25-40.
  21. Deepthi P. P. , Nithin V. S. , Sathidevi P. S. , "Implementation and analysis of stream ciphers based on the elliptic curves" Computers and Electrical Engg 35 (2009), Elsevier Publishers, pp. 300-314.
  22. Nithin V. S. , Deepthi P. P. , Dhanaraj K. J. , P. S. Sathidevi, "Stream Ciphers Based on the Elliptic Curves" International Conference on Computational Intelligence & Multimedia Applications ICCIMA 07, Volume IV. , pp. 99-104, 13-15 December 2007 at Tamil Nadu.
  23. Dhanaraj K. J, Deepthi P. P and Sathidevi P. S, "FPGA Implementation of a Pseudo Random Bit Sequence Generator Based on Elliptic Curves", International Congress for Global Science and Technology (ICGST) – Programmable Devices, Circuits and Systems (PDCS) Journal, Volume 7, Issue 1, pp. 23-31, May 2007.
  24. G. Gong, T. A. Berson, and D. R. Stinson, "Elliptic curve pseudorandom sequence generators", Technical Report, University of Waterloo, December 1998.
  25. P. H. T. Beelen and J. M. Doumen, "Pseudorandom sequences from Elliptic Curves", Finite Fields with Applications to Coding Theory, Cryptography and Related Areas", Springer-Verlag 2002, pp. 37-52.
  26. Menezes, P Van Oorschot and S. Vanstone, "Handbook of Applied Cryptography", Second Edition, CRC Press 1996.
Index Terms

Computer Science
Information Sciences

Keywords

Hash function Elliptic curve cryptosystems Stream cipher Gaussian normal basis Finite fields FPGA