A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

被引:0
|
作者
Bedoui M. [1 ]
Bouallegue B. [1 ,2 ]
Ahmed A.M. [2 ]
Hamdi B. [1 ,3 ]
Machhout M. [1 ]
Mahmoud [1 ]
Khattab M. [2 ]
机构
[1] Electronics and Micro-Electronics Laboratory (E. μ. E. L), Faculty of Sciences of Monastir, University of Monastir, Monastir
[2] College of Computer Science, King Khalid University, Abha
[3] Universite de Sousse, Institut Superieur des Sciences Appliquees et de Technologie de Sousse, Sousse
来源
关键词
digital signature; ECDSA; Elliptic curve cryptography (ECC); fault detection method; fault injection attack; FPGA; Montgomery ladder;
D O I
10.32604/csse.2023.026516
中图分类号
学科分类号
摘要
Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key. ECDSA can be implemented in different ways, in software or via dedicated hardware or a mix of both. Many different architectures are therefore possible to implement an ECDSA-based system. For this reason, this work focuses mainly on the hardware implementation of the digital signature ECDSA. In addition, the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinx field programmable gate arrays (FPGA) platform (Virtex-5). Our implementation results have been compared and discussed. Our area, frequency, area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:2177 / 2193
页数:16
相关论文
共 50 条
  • [31] The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces
    Phong Q. Nguyen
    Igor E. Shparlinski
    Designs, Codes and Cryptography, 2003, 30 : 201 - 217
  • [32] Authenticated secret session key using elliptic curve digital signature algorithm
    Mehibel, Nissa
    Hamadouche, M'hamed
    SECURITY AND PRIVACY, 2021, 4 (02)
  • [33] Design of Hyper Elliptic Curve Digital Signature
    Deng Jian-zhi
    Cheng Xiao-hui
    Gui Qiong
    ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 45 - 47
  • [34] Elliptic curve blind digital signature schemes
    You, L
    Yang, YX
    Wen, QY
    CHINESE JOURNAL OF ELECTRONICS, 2003, 12 (03): : 411 - 414
  • [35] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China
    Journal of Electronics, 2006, (01) : 54 - 57
  • [36] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui (Electronic Technology Institute
    Journal of Electronics(China), 2006, (01) : 54 - 57
  • [37] Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm
    Fan, Desheng
    Meng, Xiangfeng
    Wang, Yurong
    Yang, Xiulun
    Peng, Xiang
    He, Wenqi
    Dong, Guoyan
    Chen, Hongyi
    APPLIED OPTICS, 2013, 52 (23) : 5645 - 5652
  • [38] Provably secure and pairing-free certificateless digital signature scheme using elliptic curve cryptography
    Islam, S. K. Hafizul
    Biswas, G. P.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2013, 90 (11) : 2244 - 2258
  • [39] Elliptic curve coding technique application for digital signature
    Yildiz, Kazim
    Buldu, Ali
    Saritas, Hasan
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4242 - 4254
  • [40] Accelerating Elliptic Curve Digital Signature Algorithms on GPUs
    Feng, Zonghao
    Xie, Qipeng
    Luo, Qiong
    Chen, Yujie
    Li, Haoxuan
    Li, Huizhong
    Yan, Qiang
    SC22: INTERNATIONAL CONFERENCE FOR HIGH PERFORMANCE COMPUTING, NETWORKING, STORAGE AND ANALYSIS, 2022,