2023
DOI: 10.32604/csse.2023.026516
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm

Abstract: Since the end of the 1990s, cryptosystems implemented on smart cards have had to deal with two main categories of attacks: side-channel attacks and fault injection attacks. Countermeasures have been developed and validated against these two types of attacks, taking into account a well-defined attacker model. This work focuses on small vulnerabilities and countermeasures related to the Elliptic Curve Digital Signature Algorithm (ECDSA) algorithm. The work done in this paper focuses on protecting the ECDSA algor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Additionally, the Digital Signature Algorithm (DSA), rooted in modular arithmetic and discrete logarithms, is widely recognized for creating digital signatures. Noteworthy variants include ECDSA (Elliptic Curve Digital Signature Algorithm) [23,27], ElGamal (ElGamal Encryption Algorithm) [24], and ECDH (Elliptic Curve Diffie-Hellman) [26].…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…Additionally, the Digital Signature Algorithm (DSA), rooted in modular arithmetic and discrete logarithms, is widely recognized for creating digital signatures. Noteworthy variants include ECDSA (Elliptic Curve Digital Signature Algorithm) [23,27], ElGamal (ElGamal Encryption Algorithm) [24], and ECDH (Elliptic Curve Diffie-Hellman) [26].…”
Section: Asymmetric Encryptionmentioning
confidence: 99%
“…For example, key authentication is essential when making payments online or in shopping centers. Similarly, key exchange is necessary for secure network/client communications [20][21][22]. Therefore, an elliptic curve digital signature algorithm (ECDSA) [23] is generally employed for key authentications.…”
Section: Related Ecpm Hardware Accelerators and Limitationsmentioning
confidence: 99%
“…Today, strong cryptographic operations that are a component of cryptosystems are crucial to information security (1,2) , big data security (3) and wireless networks. https://www.indjst.org/ Advanced study (4) requires the ECDSA toughening with the incorporation of advance secrecy where even if the Signer's enigmatic key is found today, digital signatures can secure previously marked messages. The toughened ECDSA should be able to withstand security threats like man-in-the-middle attacks, replay attacks and forgery attacks.…”
Section: Introductionmentioning
confidence: 99%