An ECC with error detection and against side channel attacks for resource constrained devices
As more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional encryption schemes, elliptic curve cryptography (ECC) pro...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2024-04-01
|
Series: | Journal of King Saud University: Computer and Information Sciences |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S1319157824001083 |
_version_ | 1797214883939352576 |
---|---|
author | Jun Ye Zewen Yang |
author_facet | Jun Ye Zewen Yang |
author_sort | Jun Ye |
collection | DOAJ |
description | As more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional encryption schemes, elliptic curve cryptography (ECC) provides a higher security level with the same key size and invokes lower requirements in memory size, making ECC a desirable candidate. Since data transmission is inescapably suffered from electronic interference, communication attacks, and other elements, resulting in imperfections and inaccuracy of information transmission. Applying ECC in resource-constrained devices requires an error detection and correction mechanism, and it also needs to against side channel attacks. In this paper, an improved elliptic curve encryption scheme with an error detection and correction mechanism is proposed. Error detection is facilitated by an enhanced Montgomery ladder algorithm, while error correction is implemented through recomputation. Additionally, to safeguard against side-channel attacks, a technique of base point blinding via randomization is employed. This innovative scheme achieves a 100% error detection rate and offers robust defense against SSCA, DPA, RPA, ZPA, and Relative Doubling Attack. It has been demonstrated to surpass the efficiency and security of existing schemes, making it well-suited for deployment in devices with limited resources. |
first_indexed | 2024-04-24T11:21:15Z |
format | Article |
id | doaj.art-43594f3c99bc4cd3ac20679ec1c3bb71 |
institution | Directory Open Access Journal |
issn | 1319-1578 |
language | English |
last_indexed | 2024-04-24T11:21:15Z |
publishDate | 2024-04-01 |
publisher | Elsevier |
record_format | Article |
series | Journal of King Saud University: Computer and Information Sciences |
spelling | doaj.art-43594f3c99bc4cd3ac20679ec1c3bb712024-04-11T04:40:55ZengElsevierJournal of King Saud University: Computer and Information Sciences1319-15782024-04-01364102019An ECC with error detection and against side channel attacks for resource constrained devicesJun Ye0Zewen Yang1Corresponding author.; Key Laboratory of Internet Information Retrieval of Hainan Province, Hainan University, Haikou, 570228, Hainan, ChinaKey Laboratory of Internet Information Retrieval of Hainan Province, Hainan University, Haikou, 570228, Hainan, ChinaAs more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional encryption schemes, elliptic curve cryptography (ECC) provides a higher security level with the same key size and invokes lower requirements in memory size, making ECC a desirable candidate. Since data transmission is inescapably suffered from electronic interference, communication attacks, and other elements, resulting in imperfections and inaccuracy of information transmission. Applying ECC in resource-constrained devices requires an error detection and correction mechanism, and it also needs to against side channel attacks. In this paper, an improved elliptic curve encryption scheme with an error detection and correction mechanism is proposed. Error detection is facilitated by an enhanced Montgomery ladder algorithm, while error correction is implemented through recomputation. Additionally, to safeguard against side-channel attacks, a technique of base point blinding via randomization is employed. This innovative scheme achieves a 100% error detection rate and offers robust defense against SSCA, DPA, RPA, ZPA, and Relative Doubling Attack. It has been demonstrated to surpass the efficiency and security of existing schemes, making it well-suited for deployment in devices with limited resources.http://www.sciencedirect.com/science/article/pii/S1319157824001083Elliptic curve cryptographyError detection and correctionSide channel attack resistResource-constrained devices |
spellingShingle | Jun Ye Zewen Yang An ECC with error detection and against side channel attacks for resource constrained devices Journal of King Saud University: Computer and Information Sciences Elliptic curve cryptography Error detection and correction Side channel attack resist Resource-constrained devices |
title | An ECC with error detection and against side channel attacks for resource constrained devices |
title_full | An ECC with error detection and against side channel attacks for resource constrained devices |
title_fullStr | An ECC with error detection and against side channel attacks for resource constrained devices |
title_full_unstemmed | An ECC with error detection and against side channel attacks for resource constrained devices |
title_short | An ECC with error detection and against side channel attacks for resource constrained devices |
title_sort | ecc with error detection and against side channel attacks for resource constrained devices |
topic | Elliptic curve cryptography Error detection and correction Side channel attack resist Resource-constrained devices |
url | http://www.sciencedirect.com/science/article/pii/S1319157824001083 |
work_keys_str_mv | AT junye aneccwitherrordetectionandagainstsidechannelattacksforresourceconstraineddevices AT zewenyang aneccwitherrordetectionandagainstsidechannelattacksforresourceconstraineddevices AT junye eccwitherrordetectionandagainstsidechannelattacksforresourceconstraineddevices AT zewenyang eccwitherrordetectionandagainstsidechannelattacksforresourceconstraineddevices |