vipul gupta - Academia.edu (original) (raw)

vipul gupta

Address: haridwar,uttarakhand, India

less

Uploads

Papers by vipul gupta

Research paper thumbnail of Performance analysis of elliptic curve cryptography for SSL

Research paper thumbnail of Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors

Research paper thumbnail of A Public-Key Cryptographic Processor for RSA and ECC

Research paper thumbnail of Integrating elliptic curve cryptography into the web's security infrastructure

Research paper thumbnail of Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper

Research paper thumbnail of Experiments in wireless Internet security

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional... more Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless Web" offerings. All such offerings today use a security architecture that lacks end-to-end security. This unfortunate choice is driven by perceived inadequacies of standard Internet security protocols like SSL (secure sockets layer) on less capable CPUs and low-bandwidth wireless links. This paper presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices. Our results show that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within todays technological constraints.

Research paper thumbnail of An End-to-End Systems Approach to Elliptic Curve Cryptography

Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve C... more Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolved into a mature public-key cryptosystem. Offering the smallest key size and the highest strength per bit, its computational efficiency can benefit both client devices and server machines. We have designed a programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF(2m). The accelerator is based on a scalable architecture capable of handling curves of arbitrary field degrees up to m = 255. In addition, it delivers optimized performance for a set of commonly used curves through hard-wired reduction logic. A prototype implementation running in a Xilinx XCV2000E FPGA at 66.4 MHz shows a performance of 6987 point multiplications per second for GF(2163). We have integrated ECC into OpenSSL, today's dominant implementation of the secure Internet protocol SSL, and tested it with the Apache web server and open-source web browsers.

Research paper thumbnail of The Energy Cost of SSL in Deeply Embedded Systems

This paper presents the first empirical energy analysis of the Internet's dominant secur... more This paper presents the first empirical energy analysis of the Internet's dominant security protocol, SSL, on highly constrained devices. We have enhanced Sizzle, our tiny-footprint HTTPS stack, with energy conserving features and measured its performance on a Telos mote. ...

Research paper thumbnail of A cryptographic processor for arbitrary elliptic curves over GF(2m

International Journal of Embedded Systems, 2008

We describe a cryptographic processor for Elliptic Curve Cryptography (ECC). ECC is evolv-ing as ... more We describe a cryptographic processor for Elliptic Curve Cryptography (ECC). ECC is evolv-ing as an attractive alternative to other public-key cryptosystems such as the Rivest-Shamir-Adleman algorithm (RSA) by offering the smallest key size and the highest strength per bit. The ...

Research paper thumbnail of Speeding up Secure Web Transactions Using Elliptic Curve Cryptography

Research paper thumbnail of Accelerating Next-Generation Public-Key Cryptosystems on General-Purpose CPUs

Research paper thumbnail of Sizzle: A standards-based end-to-end security architecture for the embedded Internet

Pervasive and Mobile Computing, 2005

Research paper thumbnail of Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks

Research paper thumbnail of Performance analysis of elliptic curve cryptography for SSL

Research paper thumbnail of Architectural Extensions for Elliptic Curve Cryptography over GF(2m) on 8-bit Microprocessors

Research paper thumbnail of A Public-Key Cryptographic Processor for RSA and ECC

Research paper thumbnail of Integrating elliptic curve cryptography into the web's security infrastructure

Research paper thumbnail of Sizzle: A Standards-Based End-to-End Security Architecture for the Embedded Internet (Best Paper

Research paper thumbnail of Experiments in wireless Internet security

Internet enabled wireless devices continue to proliferate and are expected to surpass traditional... more Internet enabled wireless devices continue to proliferate and are expected to surpass traditional Internet clients in the near future. This has opened up exciting new opportunities in the mobile e-commerce market. However, data security and privacy remain major concerns in the current generation of "wireless Web" offerings. All such offerings today use a security architecture that lacks end-to-end security. This unfortunate choice is driven by perceived inadequacies of standard Internet security protocols like SSL (secure sockets layer) on less capable CPUs and low-bandwidth wireless links. This paper presents our experiences in implementing and using standard security mechanisms and protocols on small wireless devices. Our results show that SSL is a practical solution for ensuring end-to-end security of wireless Internet transactions even within todays technological constraints.

Research paper thumbnail of An End-to-End Systems Approach to Elliptic Curve Cryptography

Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve C... more Since its proposal by Victor Miller [17] and Neal Koblitz [15] in the mid 1980s, Elliptic Curve Cryptography (ECC) has evolved into a mature public-key cryptosystem. Offering the smallest key size and the highest strength per bit, its computational efficiency can benefit both client devices and server machines. We have designed a programmable hardware accelerator to speed up point multiplication for elliptic curves over binary polynomial fields GF(2m). The accelerator is based on a scalable architecture capable of handling curves of arbitrary field degrees up to m = 255. In addition, it delivers optimized performance for a set of commonly used curves through hard-wired reduction logic. A prototype implementation running in a Xilinx XCV2000E FPGA at 66.4 MHz shows a performance of 6987 point multiplications per second for GF(2163). We have integrated ECC into OpenSSL, today's dominant implementation of the secure Internet protocol SSL, and tested it with the Apache web server and open-source web browsers.

Research paper thumbnail of The Energy Cost of SSL in Deeply Embedded Systems

This paper presents the first empirical energy analysis of the Internet's dominant secur... more This paper presents the first empirical energy analysis of the Internet's dominant security protocol, SSL, on highly constrained devices. We have enhanced Sizzle, our tiny-footprint HTTPS stack, with energy conserving features and measured its performance on a Telos mote. ...

Research paper thumbnail of A cryptographic processor for arbitrary elliptic curves over GF(2m

International Journal of Embedded Systems, 2008

We describe a cryptographic processor for Elliptic Curve Cryptography (ECC). ECC is evolv-ing as ... more We describe a cryptographic processor for Elliptic Curve Cryptography (ECC). ECC is evolv-ing as an attractive alternative to other public-key cryptosystems such as the Rivest-Shamir-Adleman algorithm (RSA) by offering the smallest key size and the highest strength per bit. The ...

Research paper thumbnail of Speeding up Secure Web Transactions Using Elliptic Curve Cryptography

Research paper thumbnail of Accelerating Next-Generation Public-Key Cryptosystems on General-Purpose CPUs

Research paper thumbnail of Sizzle: A standards-based end-to-end security architecture for the embedded Internet

Pervasive and Mobile Computing, 2005

Research paper thumbnail of Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks

Log In