Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers

As cryptography is quickly entering the automotive domain, public-key cryptographic functions are a vital building block and are part of recent industry-proposed standards. Elliptic curves provide a more compact representation for public/private keys making them more suitable for embedded devices with limited amounts of memory. Nonetheless, they provide more compact signatures and open road for identity-based cryptographic primitives by exploiting the flexibility of bilinear pairings. In this work we carry a performance evaluation on some modern libraries, e.g., MIRACL, RELIC, and compare them to the more classical WolfSSL. The evaluation is carried on a state-of-the-art representative controller from the automotive industry, i.e., a 32 bit Infineon TC297. Having a crisper image on computational requirements is relevant for future automotive and industrial applications.

[1]  Christoph Krauß,et al.  On Using TLS to Secure In-Vehicle Networks , 2017, ARES.

[2]  Thomas Unterluggauer,et al.  Efficient Pairings and ECC for Embedded Systems , 2014, IACR Cryptol. ePrint Arch..

[3]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[4]  Peter Schwabe,et al.  Full-Size High-Security ECC Implementation on MSP430 Microcontrollers , 2014, LATINCRYPT.

[5]  Ingrid Verbauwhede,et al.  Ultra low-power implementation of ECC on the ARM Cortex-M0+ , 2014, 2014 51st ACM/EDAC/IEEE Design Automation Conference (DAC).

[6]  Michael Scott Pairing Implementation Revisited , 2019, IACR Cryptol. ePrint Arch..

[7]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[8]  L. Miles,et al.  2000 , 2000, RDH.

[9]  Willi Meier,et al.  SHA-3 proposal BLAKE , 2009 .

[10]  Kalinka Regina Lucas Jaquie Castelo Branco,et al.  Performance Evaluation and Comparison of Algorithms for Elliptic Curve Cryptography with El-Gamal based on MIRACL and RELIC Libraries , 2012 .

[11]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Bogdan Groza,et al.  Applications of Pairing-Based Cryptography on Automotive-Grade Microcontrollers , 2018, SAFECOMP Workshops.

[14]  Bogdan Groza,et al.  Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[15]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.