DOC PREVIEW
MASON ECE 646 - Efficient Cryptographic Implementations for Smart Cards

This preview shows page 1 out of 3 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 3 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Efficient Cryptographic Implementations for Smart CardsSwathi TripuraneniTrong NguyenIntroduction and Motivation:Smart cards technology has found its way into many important applications such as financial transactions, e-commerce, physical access control, health and transportation services, and access to wireless systems. As a result, the need for efficient cryptographic implementations for smart cards is heavily demanded in order to securely protect users’ private information. The goal of this paper is to study the four different efficient cryptographic implementations for smart cards to have data privacy and the constraints of the smart cards. These cryptographic algorithms include: secret-key encryption algorithm, standard public-key cryptography based on modular multiplication, public-key algorithm based on elliptic curves, and hash functions. In addition, the comparison of the implementation of above cryptographic algorithms would also be discussed.Time Schedule:October 15/19: Research on secret-key encryption and standard public-key cryptography based on modular multiplication completed.1st progress report completed.November 11/12: Research on public-key algorithm based on elliptic curves and hash functions completed.2nd progress report finished.December 5: Finish comparing implementations of four cryptographic algorithms and final report.December 16: Power Point Slides for project presentation completedDecember 19: Finish preparation for presentationTentative table contents of final report:I. Introduction- What are smart cards and how do they work?- Smart card design constraints- ApplicationsII. Description of four different cryptographic algorithms1. Secret-key encryption algorithms (DES, AES)2. Standard public-key cryptography based on modular multiplication (RSA, DH, DSS)3. Public-key algorithms based on elliptic curves4. Hash functions (SHA-1/2, RIPEMD)III. Comparison of the Implementation of four cryptographic algorithms - HW and/or SW- Performance such as speed (encryption) and/or flexibility- Key sizes- Physical space required on smart cards for implementation - Memory space (RAM, EEPROM used) required on smart cards for implementation (code size)- Cost of implementationIV. ConclusionV. ReferencesReferences:[1] A.J. Menezes, P.C. Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, Fla., 1997.[2] W. Stallings, Cryptography and Network Security, Prentice Hall, 4th ed., Upper Saddle River, 2006.[3] M. Scott, N. Costigan, and W. Abdulwahab, “Implementing Cryptographic Pairings on Smart Cards,” available at http://eprint.iacr.org/2006/144.pdf, Oct. 2007.[4] I.F. Blake, G. Seroussi, and N.P. Smart, “Elliptic Curves in Cryptography,” London Mathematical Society Lecture Notes Series, Cambridge Univ. Press, Cambridge, UK, 1999.[5] N. Koblitz, A Course in Number theory and Cryptography, Graduate Texts in Mathematics, 2nd ed., Springer-Verlag, berlinHeidelberg, 1994.[6] B. Schneier, Applied Cryptography. 2nd ed., John Wiley & Sons, Somerset, J.J., 1996.[7] NIST Federal Information Processing Standards Publication, “Advanced Encryption Standard (AES)”, available at http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, Nov. 2001.[8] E. Trichina and L. Korkishko, “Secure and Efficient AES Software Implementation for Smart Cards,” Proc. fifth International Workshop, WISA 2004, pp. 425-39, 2005.[9] C. Lu, S. Dos, L.M. Andre, and F. Pimentel, “Implementation of Fast RSA Key Generation on Smart Cards,” Proc. ACM Symposium on Applied Computing, pp. 214-20, 2002.[10] A. Fujioka, T. Okamoto, and S. Miyaguchi, “ESIGN: An Efficient Digital Signature Implementation for Smart Cards,” Proc. Advances in Cryptology-EUROCRYPT ’91, pp. 446-57, 1991.[11] A.K. Lenstra and E.R. Verheul, “Selecting Cryptographic Key Sizes,” Journal of Cryptography: The Journal of the International Association for Cryptologic Research, Vol. 14, no. 4, pp. 255-93,


View Full Document

MASON ECE 646 - Efficient Cryptographic Implementations for Smart Cards

Documents in this Course
Load more
Download Efficient Cryptographic Implementations for Smart Cards
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Efficient Cryptographic Implementations for Smart Cards and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Efficient Cryptographic Implementations for Smart Cards 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?