Enhancement security level and hardware implementation of ECDSA

被引:0
|
作者
Ghanmy, Nabil [1 ]
Chaari Fourati, Lamia [1 ]
Kamoun, Lotfi [1 ]
机构
[1] SFAX Univ, Elect & Informat Technol Lab LETI, Sfax, Tunisia
来源
2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC) | 2013年
关键词
ECDSA; Security; Side-channel attacks; Montgomery; FPGA; SHA-224;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic Curve Digital Signature Algorithm (ECDSA) provides several security services for resource-constrained embedded devices. It can be the target of attacks as Side-channel attacks. The ECDSA level security can be enhanced by tuning several parameters as key size and the security level of each ECDSA elementary modules such as point multiplication, hash function and pseudo random number generators (PRNG). This paper presents conception and hardware implementation of ECDSA taking in consideration requirements related to correlation between key size and security level according to academic and private organizations. In this work, we have considered a key size equal to 233 bit, Montgomery point multiplication technique and hashing functions SHA-224. The ECDSA design is implemented on a reconfigurable hardware platform (Xilinx xc6vlx760-2ff1760). We used the hardware description language VHDL for compartmental validation. The implementation results illustrate security evaluation and hardware performances in terms of time computation and area occupation.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] EM Security Analysis of Compact ECDSA Hardware
    Koiwa, Kosuke
    Fujimoto, Daisuke
    Hayashi, Yuichi
    Nagata, Makoto
    Ikeda, Makoto
    Matsumoto, Tsutomu
    Homma, Naofumi
    2018 JOINT IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND 2018 IEEE ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC/APEMC), 2018, : 12 - 12
  • [2] FAST HARDWARE IMPLEMENTATION OF ECDSA SIGNATURE SCHEME
    Sghaier, Anissa
    Zeghid, Medien
    Machhout, Mohsen
    2016 INTERNATIONAL SYMPOSIUM ON SIGNAL, IMAGE, VIDEO AND COMMUNICATIONS (ISIVC), 2016, : 343 - 348
  • [3] A scheme based on ECDSA and its implementation for information security
    Rao, G. Mallikharjuna
    Rao, K. Deergha
    INTERNATIONAL JOURNAL OF ENGINEERING SYSTEMS MODELLING AND SIMULATION, 2024, 15 (04) : 181 - 188
  • [4] Hardware implementation of bluetooth security
    Kitsos, P
    Sklavos, N
    Papadomanolakis, K
    Koufopavlou, O
    IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 21 - 29
  • [5] Hardware implementation of Elliptic Curve Digital Signature Algorithm (ECDSA) on Koblitz Curves
    Nabil, Ghanmy
    Naziha, Khlif
    Lamia, Fourati
    Lotfi, Kamoun
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS & DIGITAL SIGNAL PROCESSING (CSNDSP), 2012,
  • [6] An extensive review on IoT security challenges and LWC implementation on tiny hardware for node level security evaluation
    Sutar, Swapnil
    Mekala, Priyanka
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2022, 13 (01): : 28 - 53
  • [7] Implementation of ECDSA in WSN
    Kodali, Ravi Kishore
    2013 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION AND COMPUTING (ICCC), 2013, : 310 - 314
  • [8] Security Evaluation of Embedded Hardware Implementation
    Karter, Ledina
    Ferhati, Linda
    Tafa, Igli
    Saatciu, Denis
    Fejzaj, Julian
    2015 SCIENCE AND INFORMATION CONFERENCE (SAI), 2015, : 1272 - 1276
  • [9] Implementation of a Hardware Security Chip for Mobile Devices
    Ju, Hongil
    Kim, Youngsae
    Jeon, Yongsung
    Kim, Jeongnyeo
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2015, 61 (04) : 500 - 506
  • [10] UMTS security: system architecture and hardware implementation
    Kitsos, R.
    Sklavos, N.
    Koufopavlou, O.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2007, 7 (04): : 483 - 494