On a FPGA-based method for authentication using Edwards curves

André Himmighofen, Bernhard Jungk, S. Reith
{"title":"On a FPGA-based method for authentication using Edwards curves","authors":"André Himmighofen, Bernhard Jungk, S. Reith","doi":"10.1109/ReCoSoC.2013.6581530","DOIUrl":null,"url":null,"abstract":"Modern cryptographic authentication protocols have a wide range of real world applications to gain assurance about the identity of a potential communication partner. For example they are used as wireless keys to gain access to an otherwise restricted place, e.g. a closed door or a car. Widely used challenge-response authentication protocols have very often a shared secret, such that the a prover can convince a verifier about his identity by using this secret. The major drawback of this scheme is, that the prover and the verifier both know the shared secret, and thus the distribution of the secret is problematic. This problem can be solved by using asymmetric cryptography and adapting suitable existing protocols to the used cryptographic primitive. This paper evaluates the Schnorr protocol for FPGA implementations and adopts twisted Edwards curves, a variant of elliptic curves, for this study. Both a theoretical introduction and a thorough practical part is provided and in this way the suitability of this combination for hardware implementations is shown.","PeriodicalId":354964,"journal":{"name":"2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 8th International Workshop on Reconfigurable and Communication-Centric Systems-on-Chip (ReCoSoC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ReCoSoC.2013.6581530","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

Modern cryptographic authentication protocols have a wide range of real world applications to gain assurance about the identity of a potential communication partner. For example they are used as wireless keys to gain access to an otherwise restricted place, e.g. a closed door or a car. Widely used challenge-response authentication protocols have very often a shared secret, such that the a prover can convince a verifier about his identity by using this secret. The major drawback of this scheme is, that the prover and the verifier both know the shared secret, and thus the distribution of the secret is problematic. This problem can be solved by using asymmetric cryptography and adapting suitable existing protocols to the used cryptographic primitive. This paper evaluates the Schnorr protocol for FPGA implementations and adopts twisted Edwards curves, a variant of elliptic curves, for this study. Both a theoretical introduction and a thorough practical part is provided and in this way the suitability of this combination for hardware implementations is shown.
基于fpga的爱德华兹曲线认证方法研究
现代加密身份验证协议在现实世界中有广泛的应用,以获得对潜在通信伙伴身份的保证。例如,它们被用作无线钥匙,以进入一个其他限制的地方,例如一扇关着的门或一辆车。广泛使用的挑战-响应身份验证协议通常有一个共享的秘密,这样证明者就可以通过使用这个秘密来说服验证者他的身份。该方案的主要缺点是,证明者和验证者都知道共享秘密,因此秘密的分发存在问题。这个问题可以通过使用非对称加密和将合适的现有协议适应所使用的密码原语来解决。本文评估了用于FPGA实现的Schnorr协议,并采用椭圆曲线的一种变体twisted Edwards曲线进行研究。本文提供了理论介绍和全面的实践部分,并以这种方式展示了这种组合对硬件实现的适用性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信