An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm

被引:0
|
作者
Mouna Bedoui
Belgacem Bouallegue
Hassen Mestiri
Belgacem Hamdi
Mohsen Machhout
机构
[1] University of Monastir,Electronics and Micro
[2] King Khalid University,Electronics Laboratory (E. μ. E. L), Faculty of Sciences of Monastir
[3] Prince Sattam bin Abdulaziz University,Department of Computer Engineering, College of Computer Science
[4] University of Sousse,Department of Computer Engineering, College of Computer Engineering and Sciences
[5] Higher Institute of Applied Science and Technology of Sousse,undefined
来源
关键词
Elliptic curve cryptography (ECC); Montgomery ladder; Fault detection method; Fault injection attack;
D O I
暂无
中图分类号
学科分类号
摘要
Elliptic curve cryptosystems (ECC) are well suited to devices with limited memory and processing capabilities, such as smart cards, as well as devices with limited power, such as wireless handheld devices. This is because, for considerably smaller key sizes, elliptic curves over huge finite fields provide the same level of security as other cryptosystems like RSAECC-based circuits are vulnerable to physical attacks aimed at getting the secret key, despite its security. Fault injection attacks are a sort of physical attack that involves inserting a fault into a circuit during a cryptographic operation to alter its behavior. In this regard, we introduce a new fault detection approach based on time redundancy for the Montgomery Elliptic Curve Scalar Multiplication algorithm. We divided the ECC design into three blocks with registers placed between them. When compared to the original Montgomery ECSM algorithm, our solution takes roughly 11.65% more occupied slices overhead but yields a frequency gain of 51.27%.
引用
收藏
页码:11973 / 11992
页数:19
相关论文
共 50 条
  • [31] Concurrent realization of the multiply-by-7 elliptic curve scalar multiplication algorithm
    Department of Electrical and Electronic Engineering, Faculty of Engineering, University of Lagos, Lagos, Nigeria
    不详
    Int. Conf. Internet Technol. Secured Trans., ICITST, 2011, (797-804):
  • [32] A new elliptic curve scalar multiplication algorithm to resist simple power analysis
    Hitchcock, Y
    Montague, P
    INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 214 - 225
  • [33] Faster Scalar Multiplication Algorithm to Implement a Secured Elliptic Curve Cryptography System
    Akhter, Fatema
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (01) : 639 - 644
  • [34] The Improved Montgomery Scalar Multiplication Algorithm with DPA Resistance
    Xu, Yanqi
    Chen, Lin
    Li, Moran
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 533 - 538
  • [35] Efficient Design of Elliptic Curve Point Multiplication based on Fast Montgomery Modular Multiplication
    Mohammadi, Maryam
    Molahosseini, Amir Sabbagh
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE 2013), 2013, : 424 - 429
  • [36] Low-Latency Elliptic Curve Scalar Multiplication
    Bos, Joppe W.
    INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2012, 40 (05) : 532 - 550
  • [37] Elliptic Curve Scalar Multiplication with x-Coordinate
    ZHANG Ning1
    2. Ministry of Education Key Laboratory of Computer Networks and Information Security
    Wuhan University Journal of Natural Sciences, 2007, (01) : 163 - 166
  • [38] Analysis of Elliptic Curve Scalar Multiplication in Secure Communications
    Thomas, Christina
    Sheela, K. Gnana
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 611 - 615
  • [39] Pipelined computation of scalar multiplication in elliptic curve cryptosystems
    Mishra, PK
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 328 - 342
  • [40] Secure and Compact Elliptic Curve LR Scalar Multiplication
    Jin, Yaoan
    Miyaji, Atsuko
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 605 - 618