An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm

被引:0
|
作者
Mouna Bedoui
Belgacem Bouallegue
Hassen Mestiri
Belgacem Hamdi
Mohsen Machhout
机构
[1] University of Monastir,Electronics and Micro
[2] King Khalid University,Electronics Laboratory (E. μ. E. L), Faculty of Sciences of Monastir
[3] Prince Sattam bin Abdulaziz University,Department of Computer Engineering, College of Computer Science
[4] University of Sousse,Department of Computer Engineering, College of Computer Engineering and Sciences
[5] Higher Institute of Applied Science and Technology of Sousse,undefined
来源
关键词
Elliptic curve cryptography (ECC); Montgomery ladder; Fault detection method; Fault injection attack;
D O I
暂无
中图分类号
学科分类号
摘要
Elliptic curve cryptosystems (ECC) are well suited to devices with limited memory and processing capabilities, such as smart cards, as well as devices with limited power, such as wireless handheld devices. This is because, for considerably smaller key sizes, elliptic curves over huge finite fields provide the same level of security as other cryptosystems like RSAECC-based circuits are vulnerable to physical attacks aimed at getting the secret key, despite its security. Fault injection attacks are a sort of physical attack that involves inserting a fault into a circuit during a cryptographic operation to alter its behavior. In this regard, we introduce a new fault detection approach based on time redundancy for the Montgomery Elliptic Curve Scalar Multiplication algorithm. We divided the ECC design into three blocks with registers placed between them. When compared to the original Montgomery ECSM algorithm, our solution takes roughly 11.65% more occupied slices overhead but yields a frequency gain of 51.27%.
引用
收藏
页码:11973 / 11992
页数:19
相关论文
共 50 条
  • [21] Hard problems in elliptic curve scalar multiplication
    Vijayarangan, Natarajan
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (05): : 445 - 452
  • [22] Elliptic Curve Scalar Multiplication with a Bijective Transform
    Nagai, Yoshitaka
    Shirase, Masaaki
    Izu, Tetsuya
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 280 - 286
  • [23] Parallel scalar multiplication for elliptic curve cryptosystems
    Ansari, B
    Wu, HP
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73
  • [24] Overview of Scalar Multiplication in Elliptic Curve Cryptography
    Li, Ye
    Feng, Liu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2670 - 2673
  • [25] Optimization algorithm for scalar multiplication in the elliptic curve cryptography over prime field
    Hao, Yuanling
    Ma, Shiwei
    Chen, Guanghua
    Zhang, Xiaoli
    Chen, Hui
    Zeng, Weimin
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2008, 5226 : 904 - +
  • [26] A parallel algorithm for computing simultaneous inversions with application to elliptic curve scalar multiplication
    Sarkar, P
    Mishra, PK
    Barua, R
    PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 782 - 785
  • [27] Elliptic Curve Scalar Multiplication over Prime Field for both Affine and Jacobian Coordinates
    School of Electronics Engineering, Vellore Institute of Technology, Chennai, India
    Proc. Int. Conf. Intell. Innov. Technol. Comput., Electr. Electron., ICIITCEE, 1600, (232-237): : 232 - 237
  • [28] Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases
    Meloni, Nicolas
    Hasan, M. Anwar
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 304 - 316
  • [29] Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields
    Li, Xingran
    Yu, Wei
    Li, Bao
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020 (2020)
  • [30] Anti-Spa Scalar Multiplication Algorithm on Twisted Edwards Elliptic Curve
    Shuang-Gen, Liu
    Heng, Xin
    Yuan-Meng, Li
    Shuang-Gen, Liu (liusgxupt@163.com), 1600, Femto Technique Co., Ltd. (22): : 1015 - 1021