An ECC with error detection and against side channel attacks for resource constrained devices

As more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional encryption schemes, elliptic curve cryptography (ECC) pro...

Full description

Bibliographic Details
Main Authors: Jun Ye, Zewen Yang
Format: Article
Language:English
Published: Elsevier 2024-04-01
Series:Journal of King Saud University: Computer and Information Sciences
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1319157824001083
_version_ 1797214883939352576
author Jun Ye
Zewen Yang
author_facet Jun Ye
Zewen Yang
author_sort Jun Ye
collection DOAJ
description As more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional encryption schemes, elliptic curve cryptography (ECC) provides a higher security level with the same key size and invokes lower requirements in memory size, making ECC a desirable candidate. Since data transmission is inescapably suffered from electronic interference, communication attacks, and other elements, resulting in imperfections and inaccuracy of information transmission. Applying ECC in resource-constrained devices requires an error detection and correction mechanism, and it also needs to against side channel attacks. In this paper, an improved elliptic curve encryption scheme with an error detection and correction mechanism is proposed. Error detection is facilitated by an enhanced Montgomery ladder algorithm, while error correction is implemented through recomputation. Additionally, to safeguard against side-channel attacks, a technique of base point blinding via randomization is employed. This innovative scheme achieves a 100% error detection rate and offers robust defense against SSCA, DPA, RPA, ZPA, and Relative Doubling Attack. It has been demonstrated to surpass the efficiency and security of existing schemes, making it well-suited for deployment in devices with limited resources.
first_indexed 2024-04-24T11:21:15Z
format Article
id doaj.art-43594f3c99bc4cd3ac20679ec1c3bb71
institution Directory Open Access Journal
issn 1319-1578
language English
last_indexed 2024-04-24T11:21:15Z
publishDate 2024-04-01
publisher Elsevier
record_format Article
series Journal of King Saud University: Computer and Information Sciences
spelling doaj.art-43594f3c99bc4cd3ac20679ec1c3bb712024-04-11T04:40:55ZengElsevierJournal of King Saud University: Computer and Information Sciences1319-15782024-04-01364102019An ECC with error detection and against side channel attacks for resource constrained devicesJun Ye0Zewen Yang1Corresponding author.; Key Laboratory of Internet Information Retrieval of Hainan Province, Hainan University, Haikou, 570228, Hainan, ChinaKey Laboratory of Internet Information Retrieval of Hainan Province, Hainan University, Haikou, 570228, Hainan, ChinaAs more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional encryption schemes, elliptic curve cryptography (ECC) provides a higher security level with the same key size and invokes lower requirements in memory size, making ECC a desirable candidate. Since data transmission is inescapably suffered from electronic interference, communication attacks, and other elements, resulting in imperfections and inaccuracy of information transmission. Applying ECC in resource-constrained devices requires an error detection and correction mechanism, and it also needs to against side channel attacks. In this paper, an improved elliptic curve encryption scheme with an error detection and correction mechanism is proposed. Error detection is facilitated by an enhanced Montgomery ladder algorithm, while error correction is implemented through recomputation. Additionally, to safeguard against side-channel attacks, a technique of base point blinding via randomization is employed. This innovative scheme achieves a 100% error detection rate and offers robust defense against SSCA, DPA, RPA, ZPA, and Relative Doubling Attack. It has been demonstrated to surpass the efficiency and security of existing schemes, making it well-suited for deployment in devices with limited resources.http://www.sciencedirect.com/science/article/pii/S1319157824001083Elliptic curve cryptographyError detection and correctionSide channel attack resistResource-constrained devices
spellingShingle Jun Ye
Zewen Yang
An ECC with error detection and against side channel attacks for resource constrained devices
Journal of King Saud University: Computer and Information Sciences
Elliptic curve cryptography
Error detection and correction
Side channel attack resist
Resource-constrained devices
title An ECC with error detection and against side channel attacks for resource constrained devices
title_full An ECC with error detection and against side channel attacks for resource constrained devices
title_fullStr An ECC with error detection and against side channel attacks for resource constrained devices
title_full_unstemmed An ECC with error detection and against side channel attacks for resource constrained devices
title_short An ECC with error detection and against side channel attacks for resource constrained devices
title_sort ecc with error detection and against side channel attacks for resource constrained devices
topic Elliptic curve cryptography
Error detection and correction
Side channel attack resist
Resource-constrained devices
url http://www.sciencedirect.com/science/article/pii/S1319157824001083
work_keys_str_mv AT junye aneccwitherrordetectionandagainstsidechannelattacksforresourceconstraineddevices
AT zewenyang aneccwitherrordetectionandagainstsidechannelattacksforresourceconstraineddevices
AT junye eccwitherrordetectionandagainstsidechannelattacksforresourceconstraineddevices
AT zewenyang eccwitherrordetectionandagainstsidechannelattacksforresourceconstraineddevices