Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices

Abstract : The Micro Edition of the Java 2 platform (J2ME) provides an application environment specifically designed to address the demands of embedded devices like cell phones, PDAs or set-top boxes. Since the J2ME platform does not include a crypto package, developers are forced to use third-party classes or to implement all cryptographic primitives from scratch. However, most existing implementations of elliptic curve (EC) cryptography for J2ME do not perform well on resource-restricted devices, in most cases due to poor efficiency of the underlying arithmetic operations. In this paper we present an optimized Java implementation of EC scalar multiplication that combines efficient finite-field arithmetic with efficient group arithmetic. More precisely, our implementation uses a pseudo-Mersenne (PM) prime field for fast modular reduction and a Gallant-Lambert-Vanstone (GLV) curve with an efficiently computable endomorphism to speed up the scalar multiplication with random base points. Our experimental results show that a conventional mobile phone without Java acceleration, such as the Nokia 6610, is capable to execute a 174-bit scalar multiplication in roughly 400 msec, which is more than 45 times faster than the widely-used Bouncy Castle Lightweight Crypto API for J2ME.
Document type :
Conference papers
Complete list of metadatas

Cited literature [26 references]  Display  Hide  Download

https://hal.inria.fr/hal-01534311
Contributor : Hal Ifip <>
Submitted on : Wednesday, June 7, 2017 - 3:03:43 PM
Last modification on : Wednesday, June 7, 2017 - 3:05:24 PM
Long-term archiving on : Friday, September 8, 2017 - 1:01:23 PM

File

978-3-642-30955-7_17_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Johann Großschädl, Dan Page, Stefan Tillich. Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. 6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.189-207, ⟨10.1007/978-3-642-30955-7_17⟩. ⟨hal-01534311⟩

Share

Metrics

Record views

107

Files downloads

268