A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

被引:0
|
作者
Bedoui M. [1 ]
Bouallegue B. [1 ,2 ]
Ahmed A.M. [2 ]
Hamdi B. [1 ,3 ]
Machhout M. [1 ]
Mahmoud [1 ]
Khattab M. [2 ]
机构
[1] Electronics and Micro-Electronics Laboratory (E. μ. E. L), Faculty of Sciences of Monastir, University of Monastir, Monastir
[2] College of Computer Science, King Khalid University, Abha
[3] Universite de Sousse, Institut Superieur des Sciences Appliquees et de Technologie de Sousse, Sousse
来源
关键词
digital signature; ECDSA; Elliptic curve cryptography (ECC); fault detection method; fault injection attack; FPGA; Montgomery ladder;
D O I
10.32604/csse.2023.026516
中图分类号
学科分类号
摘要
Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algorithm against fault-injection attacks. More precisely, we are interested in the countermeasures of scalar multiplication in the body of the elliptic curves to protect against attacks concerning only a few bits of secret may be sufficient to recover the private key. ECDSA can be implemented in different ways, in software or via dedicated hardware or a mix of both. Many different architectures are therefore possible to implement an ECDSA-based system. For this reason, this work focuses mainly on the hardware implementation of the digital signature ECDSA. In addition, the proposed ECDSA architecture with and without fault detection for the scalar multiplication have been implemented on Xilinx field programmable gate arrays (FPGA) platform (Virtex-5). Our implementation results have been compared and discussed. Our area, frequency, area overhead and frequency degradation have been compared and it is shown that the proposed architecture of ECDSA with fault detection for the scalar multiplication allows a trade-off between the hardware overhead and the security of the ECDSA. © 2023 CRL Publishing. All rights reserved.
引用
收藏
页码:2177 / 2193
页数:16
相关论文
共 50 条
  • [41] Multi-Resolution Elliptic Curve Digital Signature
    Chuchaisri, Panoat
    Newman, Richard E.
    37TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2012), 2012, : 93 - 101
  • [42] Hash Function and Digital Signature based on Elliptic Curve
    Manel, Dridi
    Raouf, Ouni
    Ramzi, Haddaji
    Mtibaa, Abdellatif
    14TH INTERNATIONAL CONFERENCE ON SCIENCES AND TECHNIQUES OF AUTOMATIC CONTROL & COMPUTER ENGINEERING STA 2013, 2013, : 388 - 392
  • [43] Implementation of an elliptic curve cryptography hardware accelerator for smart cards
    Lee, S
    Lee, Y
    Kim, Y
    Park, Y
    Jun, S
    Chung, K
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 607 - 610
  • [44] Enhancing the Performance of Elliptic Curve Digital Signature Algorithm (ECDSA) in Named Data Networking (NDN)
    Lee, Ren Ting
    Leau, Yu-Beng
    Park, Yong Jin
    Obit, Joe H.
    2018 8TH IEEE INTERNATIONAL CONFERENCE ON CONTROL SYSTEM, COMPUTING AND ENGINEERING (ICCSCE 2018), 2018, : 65 - 69
  • [45] Hardware implementation of an elliptic curve processor over GF(p)
    Örs, SB
    Batina, L
    Preneel, B
    Vandewalle, J
    IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, PROCEEDINGS, 2003, : 433 - 443
  • [46] Provably secure digital signature schemes: TSH-ESIGN and (elliptic-curve) Okamoto-Schnorr
    Okamoto, Tatsuaki
    Fujisaki, Eiichiro
    NTT R and D, 1999, 48 (10): : 750 - 755
  • [47] Secure and Efficient RNS software implementation for Elliptic Curve Cryptography
    Fournaris, Apostolos P.
    Papachristodoulou, Louiza
    Sklavos, Nicolas
    2017 2ND IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2017, : 86 - 93
  • [48] An efficient implementation of the digital signature algorithm
    Kitsos, P
    Sklavos, N
    Koufopavlou, O
    ICES 2002: 9TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS I-111, CONFERENCE PROCEEDINGS, 2002, : 1151 - 1154
  • [49] Hyper Elliptic Curve System Digital Signature in Identity Authentication
    Wei, Li-feng
    Ji, Jian-wei
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (ICCSAI 2013), 2013, : 35 - 38
  • [50] Improved throughput of Elliptic Curve Digital Signature Algorithm (ECDSA) processor implementation over Koblitz curve k-163 on Field Programmable Gate Array (FPGA)
    Tawfeeq, Firas Gh
    Abdul-Hadi, Alaa M.
    BAGHDAD SCIENCE JOURNAL, 2020, 17 (03) : 1029 - 1040