##### Special-purpose chip reduces power consumption of public-key encryption by 99.75 percent, increases speed 500-fold. Most sensitive web transactions are protected by public-key cryptography, a type of encryption that lets computers share information securely without first agreeing on a secret encryption key.

Public-key encryption protocols are complicated, and in computer networks, they’re executed by software. But that won’t work in the internet of things, an envisioned network that would connect many different sensors — embedded in vehicles, appliances, civil structures, manufacturing equipment, and even livestock tags — to online servers. Embedded sensors that need to maximize battery life can’t afford the energy and memory space that software execution of encryption protocols would require.

MIT researchers have built a new chip, hardwired to perform public-key encryption, that consumes only 1/400 as much power as software execution of the same protocols would. It also uses about 1/10 as much memory and executes 500 times faster. The researchers describe the chip in a paper they’re presenting this week at the International Solid-State Circuits Conference.

Like most modern public-key encryption systems, the researchers’ chip uses a technique called elliptic-curve encryption. As its name suggests, elliptic-curve encryption relies on a type of mathematical function called an elliptic curve. In the past, researchers — including the same MIT group that developed the new chip — have built chips hardwired to handle specific elliptic curves or families of curves. What sets the new chip apart is that it is designed to handle any elliptic curve.

“Cryptographers are coming up with curves with different properties, and they use different primes,” says Utsav Banerjee, an MIT graduate student in electrical engineering and computer science and first author on the paper. “There is a lot of debate regarding which curve is secure and which curve to use, and there are multiple governments with different standards coming up that talk about different curves. With this chip, we can support all of them, and hopefully, when new curves come along in the future, we can support them as well.”

Joining Banerjee on the paper are his thesis advisor, Anantha Chandrakasan, dean of MIT’s School of Engineering and the Vannevar Bush Professor of Electrical Engineering and Computer Science; Arvind, the Johnson Professor in Computer Science Engineering; and Andrew Wright and Chiraag Juvekar, both graduate students in electrical engineering and computer science.

**Modular reasoning**

To create their general-purpose elliptic-curve chip, the researchers decomposed the cryptographic computation into its constituent parts. Elliptic-curve cryptography relies on modular arithmetic, meaning that the values of the numbers that figure into the computation are assigned a limit. If the result of some calculation exceeds that limit, it’s divided by the limit, and only the remainder is preserved. The secrecy of the limit helps ensure cryptographic security.

One of the computations to which the MIT chip devotes a special-purpose circuit is thus modular multiplication. But because elliptic-curve cryptography deals with large numbers, the chip’s modular multiplier is massive. Typically, a modular multiplier might be able to handle numbers with 16 or maybe 32 binary digits, or bits. For larger computations, the results of discrete 16- or 32-bit multiplications would be integrated by additional logic circuits.

The MIT chip’s modular multiplier can handle 256-bit numbers, however. Eliminating the extra circuitry for integrating smaller computations both reduces the chip’s energy consumption and increases its speed.

Another key operation in elliptic-curve cryptography is called inversion. Inversion is the calculation of a number that, when multiplied by a given number, will yield a modular product of 1. In previous chips dedicated to elliptic-curve cryptography, inversions were performed by the same circuits that did the modular multiplications, saving chip space. But the MIT researchers instead equipped their chip with a special-purpose inverter circuit. This increases the chip’s surface area by 10 percent, but it cuts the power consumption in half.

The most common encryption protocol to use elliptic-curve cryptography is called the datagram transport layer security protocol, which governs not only the elliptic-curve computations themselves but also the formatting, transmission, and handling of the encrypted data. In fact, the entire protocol is hardwired into the MIT researchers’ chip, which dramatically reduces the amount of memory required for its execution.

The chip also features a general-purpose processor that can be used in conjunction with the dedicated circuitry to execute other elliptic-curve-based security protocols. But it can be powered down when not in use, so it doesn’t compromise the chip’s energy efficiency.

“They move a certain amount of functionality that used to be in software into hardware,” says Xiaolin Lu, director of the internet of things (IOT) lab at Texas Instruments. “That has advantages that include power and cost. But from an industrial IOT perspective, it’s also a more user-friendly implementation. For whoever writes the software, it’s much simpler.”

Learn more: Energy-efficient encryption for the internet of things

##### The Latest on: Elliptic-curve encryption

- Global Quantum Cryptography Industry on February 14, 2019 at 2:43 pm
Public-key Cryptosystems in Common Use RSA Cryptosystem ElGamal Cryptosystem Elliptic Curve Cryptosystems McEliece Cryptosystem Limitations in Public-key Cryptosystems Led to the Emergence of Quantum ... […]

- Low-Cost Security Solutions Simplify IoT Cloud Connectivity on February 11, 2019 at 10:32 am
Each secure element provides an 18-digit hexadecimal Unique Identification Number (UID) and a public or private key pair, pre-generated using elliptic-curve cryptography. The UID can be viewed on the ... […]

- Serious Security: Post-Quantum Cryptography (and why we’re getting it) on February 7, 2019 at 7:57 am
So far, so good, except that we use public key algorithms, such as RSA and elliptic curve cryptography (ECC), to do our initial AES key agreement, and those public-key algorithms can be attacked ... […]

- More than just cryptography: The performance advantages of Suite B compliance on January 30, 2019 at 4:00 pm
It can also be used to execute key computation with ECDH schemes in ANSI X9.63, NIST SP800-56a [including Elliptic Curve Integrated Encryption Scheme (ECIES), Unified Model, STS, ECMQV, and ElGamal en... […]

- Compiling NodeMCU for the ESP32 With Support for Public-Private Key Encryption on January 3, 2019 at 7:07 am
About seven weeks ago, support for the libSodium Elliptic Curve Cryptography library was added. Cryptography is not the strongest feature of IoT devices, and some of the methods I’ve used on the ESP82... […]

- ECC elliptic curve encryption on January 3, 2019 at 3:47 am
This article written by Li Jianying explains the ECC eclliptic curve encryption in a simple way. Regarding RSA’s idea of public-private key encryption, I thought I knew it well and I was skillful of i... […]

- As quantum computing draws near, cryptography security concerns grow on January 2, 2019 at 3:53 am
In fact, the U.S. National Institute of Standards and Technology (NIST) believes that quantum computing will break the most of the near-ubiquitous encryption protocols like RSA and Elliptic Curve publ... […]

- What IT Managers Should Know About Asymmetric and Elliptic Curve Cryptography on November 29, 2018 at 4:00 pm
Although encryption is the primary goal, many encryption systems depend on a combination of tools to accomplish other tasks. Public-key cryptography is one of those tools. Although public-key cryptogr... […]

- Bitcoin Key Mechanism and Elliptic Curves Over Finite Fields on August 21, 2018 at 10:19 am
Bitcoin uses the Elliptic Curve Digital Signature Algorithm (ECDSA) based on elliptic curve cryptography. The particular elliptic curve is known as secp256k1, which is the curve: y² = x³ + 7 This occu... […]

- Bottomley: Using Elliptic Curve Cryptography with TPM2 on October 15, 2017 at 9:17 am
James Bottomley describes the use of the trusted platform module with elliptic-curve cryptography, with a substantial digression into how the elliptic-curve algorithm itself works. "The initial attrac... […]

*via Google News and Bing News*