An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm

被引:0
|
作者
Mouna Bedoui
Belgacem Bouallegue
Hassen Mestiri
Belgacem Hamdi
Mohsen Machhout
机构
[1] University of Monastir,Electronics and Micro
[2] King Khalid University,Electronics Laboratory (E. μ. E. L), Faculty of Sciences of Monastir
[3] Prince Sattam bin Abdulaziz University,Department of Computer Engineering, College of Computer Science
[4] University of Sousse,Department of Computer Engineering, College of Computer Engineering and Sciences
[5] Higher Institute of Applied Science and Technology of Sousse,undefined
来源
关键词
Elliptic curve cryptography (ECC); Montgomery ladder; Fault detection method; Fault injection attack;
D O I
暂无
中图分类号
学科分类号
摘要
Elliptic curve cryptosystems (ECC) are well suited to devices with limited memory and processing capabilities, such as smart cards, as well as devices with limited power, such as wireless handheld devices. This is because, for considerably smaller key sizes, elliptic curves over huge finite fields provide the same level of security as other cryptosystems like RSAECC-based circuits are vulnerable to physical attacks aimed at getting the secret key, despite its security. Fault injection attacks are a sort of physical attack that involves inserting a fault into a circuit during a cryptographic operation to alter its behavior. In this regard, we introduce a new fault detection approach based on time redundancy for the Montgomery Elliptic Curve Scalar Multiplication algorithm. We divided the ECC design into three blocks with registers placed between them. When compared to the original Montgomery ECSM algorithm, our solution takes roughly 11.65% more occupied slices overhead but yields a frequency gain of 51.27%.
引用
收藏
页码:11973 / 11992
页数:19
相关论文
共 50 条
  • [41] Parallelized Software Implementation of Elliptic Curve Scalar Multiplication
    Robert, Jean-Marc
    INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 445 - 462
  • [42] Low-Latency Elliptic Curve Scalar Multiplication
    Joppe W. Bos
    International Journal of Parallel Programming, 2012, 40 : 532 - 550
  • [43] Efficient Elliptic Curve Parallel Scalar Multiplication Methods
    Al-Otaibi, Ahmed
    Al-Somani, Turki F.
    Beckett, Paul
    2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS (ICCES), 2013, : 116 - 123
  • [44] Fast and secure elliptic curve scalar multiplication algorithm based on special addition chains
    Liu, Shuanggen
    Hu, Yupu
    Journal of Southeast University (English Edition), 2008, 24 (01) : 29 - 32
  • [45] A FAST AND SECURE ELLIPTIC CURVE SCALAR MULTIPLICATION ALGORITHM OVER GF(p(m))
    Liu, Shuang-Gen
    Hu, Yu-Pu
    Ni, Hai-Ying
    Xu, Wen-Sheng
    Liao, Yun-Yan
    JOURNAL OF INDUSTRIAL AND PRODUCTION ENGINEERING, 2009, 26 (04) : 255 - 265
  • [46] The elliptic scalar multiplication graph and its application in elliptic curve cryptography
    Aljamaly, Karrar Taher R.
    Ajeena, Ruma Kareem K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1793 - 1807
  • [47] An Improvement of Scalar Multiplication on Elliptic Curve Defined over Extension Field Fq2
    Al-Amin, Khandaker Md.
    Nogami, Yasuyuki
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-TAIWAN (ICCE-TW), 2016, : 13 - 14
  • [48] New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA
    Liu, Duo
    Tan, Zhiyong
    Dai, Yiqi
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 253 - 264
  • [49] Elliptic curve scalar point multiplication using radix-4 booth's algorithm
    Moon, S
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 80 - 83
  • [50] Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion
    Jin, Yaoan
    Miyaji, Atsuko
    COMPUTER JOURNAL, 2024, 67 (02): : 474 - 484