A Survey of Elliptic Curve Cryptography Implementation Approaches for Efficient Smart Card Processing

Smart cards have been used for many different purposes over the last two decades, from simple prepaid credit counter cards used in parking meters, to high security identity cards intended for national ID programs. This has increased data privacy and security requirements. Data protection and authentication is now demanded for performing Electronic payment and allow secure multi-level access to private information. ECC uses smaller key sizes compared to traditionally used RSA based cryptosystems. Elliptic Curve Cryptography is especially suited to smart card based message authentication because of its smaller memory and computational power requirements than public key cryptosystems. It is observed that the performance of ECC based approach is significantly better than RSA and DSA/DH based approaches because of the low memory and computational requirements, smaller key size, low power and timing consumptions.

[1]  Kamlesh Dutta,et al.  A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment , 2010 .

[2]  Sanjay Kumar Jena,et al.  A Novel Remote User Authentication Scheme Using Smart Card Based on ECDLP , 2009, 2009 International Conference on Advanced Computer Control.

[3]  Kuldip Singh,et al.  A Password-Authenticated Key Agreement Scheme Based on ECC Using Smart Cards , 2010 .

[4]  Subhendu Kumar Pani,et al.  A modified remote user authentication scheme using smart card based on ECDLP , 2009, 2009 International Conference on Industrial and Information Systems (ICIIS).

[5]  Christof Paar,et al.  Elliptic Curve Cryptography on Smart Cards without Coprocessors , 2001, CARDIS.

[6]  Emmanuel Opara,et al.  Bioinetric and Systems Security: An Overview of End-To-End Security System , 2015, Communications of the IIMA.

[7]  Ahmad Khaled M. Al-Kayali,et al.  Elliptic Curve Cryptography and Smart Cards , 2004 .

[8]  E. Dawson,et al.  Implementing an efficient elliptic curve cryptosystem over $GF(p)$ on a smart card , 2003 .

[9]  K. Goyal,et al.  A NOVEL REMOTE USER AUTHENTICATION SCHEME USING SMART CARD WITH BIOMETRIC BASED ON ECDLP , 2011 .

[10]  Paulo S. L. M. Barreto,et al.  Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps , 2005, ASIACRYPT.

[11]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[12]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[13]  Antonio Bernardino de Almeida,et al.  A Review of Smartcard Security Issues , 2011 .

[14]  Wasim A. Al-Hamdani Elliptic curve for data protection , 2011, InfoSecCD.

[15]  Elisa Bertino,et al.  Privacy preserving multi-factor authentication with biometrics , 2006, DIM '06.