TY - GEN
T1 - A Software-Based Low-Latency Elliptic Curve Cryptography Design Over Prime Fields
AU - Nguyen, Tuy Tan
AU - Bao Nguyen, Tram Thi
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - This paper presents an innovative approach that enhances arithmetic operations in elliptic curve cryptography (ECC) over prime fields. By strategically integrating an efficient point multiplication algorithm into ECC, we achieve a substantial acceleration in the speed and efficiency of encryption and decryption processes. This improvement is further amplified by concurrent parallel execution of arithmetic operations, resulting in a significant reduction in encryption and decryption processing times. Empirical evaluations conducted across diverse datasets unequivocally validate the effectiveness of the proposed algorithm, demonstrating a remarkable acceleration of up to 23% and 40% in encryption and decryption operations, respectively. This research not only contributes to the advancement of ECC but also holds profound implications for the broader cryptographic landscape, establishing a compelling foundation for secure data communication and digital privacy.
AB - This paper presents an innovative approach that enhances arithmetic operations in elliptic curve cryptography (ECC) over prime fields. By strategically integrating an efficient point multiplication algorithm into ECC, we achieve a substantial acceleration in the speed and efficiency of encryption and decryption processes. This improvement is further amplified by concurrent parallel execution of arithmetic operations, resulting in a significant reduction in encryption and decryption processing times. Empirical evaluations conducted across diverse datasets unequivocally validate the effectiveness of the proposed algorithm, demonstrating a remarkable acceleration of up to 23% and 40% in encryption and decryption operations, respectively. This research not only contributes to the advancement of ECC but also holds profound implications for the broader cryptographic landscape, establishing a compelling foundation for secure data communication and digital privacy.
KW - decryption
KW - elliptic curve cryptography
KW - Encryption
KW - point multiplication
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85186141776&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85186141776&partnerID=8YFLogxK
U2 - 10.1109/IMCOM60618.2024.10418341
DO - 10.1109/IMCOM60618.2024.10418341
M3 - Conference contribution
AN - SCOPUS:85186141776
T3 - Proceedings of the 2024 18th International Conference on Ubiquitous Information Management and Communication, IMCOM 2024
BT - Proceedings of the 2024 18th International Conference on Ubiquitous Information Management and Communication, IMCOM 2024
A2 - Lee, Sukhan
A2 - Choo, Hyunseung
A2 - Ismail, Roslan
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 18th International Conference on Ubiquitous Information Management and Communication, IMCOM 2024
Y2 - 3 January 2024 through 5 January 2024
ER -