Novel Fault Attack Resistant Elliptic Curve Processor Architecture

被引:0
|
作者
Zode, Pravin P. [1 ]
Deshmukh, R. B. [2 ]
机构
[1] Yeshwantrao Chavan Coll Engn, Dept Elect Engn, Nagpur, Maharashtra, India
[2] Visvesvaraya Natl Inst Technol, Ctr VLSI & Nano Technol, Nagpur, Maharashtra, India
关键词
Fault Attacks; Elliptic Curve Scalar Multiplication; Elliptic Curve Cryptosystem;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Fault attacks on Elliptic Curve Cryptosystems have drawn considerable attention. This paper improves fault attack resistant architecture for Elliptic Curve Cryptosystems proposed by Agustin Dominguez et al. using point validation module. Proposed architecture improves the architecture by adding time shared Point Validation module, Zero-One detector and comparator module. The proposed architecture prevents fault, saves computation time and resists revealing of the secret key information. Proposed architecture is implemented on Xilinx Virtex-6 platform. Area is decreased by 5.61% as we have used time shared point validator unit. Also, power is saved by 18.27%.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] FPGA implementation of a microcoded elliptic curve cryptographic processor
    Leung, KH
    Ma, KW
    Wong, WK
    Leong, PHW
    [J]. 2000 IEEE SYMPOSIUM ON FIELD-PROGRAMMABLE CUSTOM COMPUTING MACHINES, PROCEEDINGS, 2000, : 68 - 76
  • [42] A Low-Power Elliptic Curve Processor for WISP
    Mendez Cabana, Igor
    Silva-Cardenas, Carlos
    [J]. 2021 19TH IEEE INTERNATIONAL NEW CIRCUITS AND SYSTEMS CONFERENCE (NEWCAS), 2021,
  • [43] Throughput/area optimised pipelined architecture for elliptic curve crypto processor (vol 13, pg 361, 2019)
    Imran, M.
    [J]. IET COMPUTERS AND DIGITAL TECHNIQUES, 2021, 15 (01): : 77 - 77
  • [44] Differential fault attacks on elliptic curve cryptosystems
    Biehl, I
    Meyer, B
    Müller, V
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 131 - 146
  • [45] LOW EXPONENT ATTACK AGAINST ELLIPTIC CURVE RSA
    KUROSAWA, K
    OKADA, K
    TSUJII, S
    [J]. INFORMATION PROCESSING LETTERS, 1995, 53 (02) : 77 - 83
  • [46] Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
    Sajjad, Anum
    Afzal, Mehreen
    Iqbal, Waseem
    Abbas, Haider
    Latif, Rabia
    Raza, Rana Aamir
    [J]. IEEE ACCESS, 2020, 8 : 139903 - 139917
  • [47] Low exponent attack against elliptic curve RSA
    Kurosawa, E
    Okada, K
    Tsujii, S
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT '94, 1995, 917 : 376 - 383
  • [48] Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
    Jiang, Kun
    Zhao, Bing
    Shan, Weijun
    Wang, Lihui
    Liu, Jing
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 233 - 236
  • [49] Design, Evaluation and Certification of Elliptic Curve Crypto-Processor
    Simion, Emil
    Mihailescu, Marius Iulian
    [J]. PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 435 - 438
  • [50] A scalable dual-field elliptic curve cryptographic processor
    Satoh, A
    Takano, K
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2003, 52 (04) : 449 - 460