TY - JOUR
T1 - An improvement of both security and reliability for elliptic curve scalar multiplication Montgomery algorithm
AU - Bedoui, Mouna
AU - Bouallegue, Belgacem
AU - Mestiri, Hassen
AU - Hamdi, Belgacem
AU - Machhout, Mohsen
N1 - Publisher Copyright:
© 2022, The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2023/3
Y1 - 2023/3
N2 - Elliptic curve cryptosystems (ECC) are well suited to devices with limited memory and processing capabilities, such as smart cards, as well as devices with limited power, such as wireless handheld devices. This is because, for considerably smaller key sizes, elliptic curves over huge finite fields provide the same level of security as other cryptosystems like RSAECC-based circuits are vulnerable to physical attacks aimed at getting the secret key, despite its security. Fault injection attacks are a sort of physical attack that involves inserting a fault into a circuit during a cryptographic operation to alter its behavior. In this regard, we introduce a new fault detection approach based on time redundancy for the Montgomery Elliptic Curve Scalar Multiplication algorithm. We divided the ECC design into three blocks with registers placed between them. When compared to the original Montgomery ECSM algorithm, our solution takes roughly 11.65% more occupied slices overhead but yields a frequency gain of 51.27%.
AB - Elliptic curve cryptosystems (ECC) are well suited to devices with limited memory and processing capabilities, such as smart cards, as well as devices with limited power, such as wireless handheld devices. This is because, for considerably smaller key sizes, elliptic curves over huge finite fields provide the same level of security as other cryptosystems like RSAECC-based circuits are vulnerable to physical attacks aimed at getting the secret key, despite its security. Fault injection attacks are a sort of physical attack that involves inserting a fault into a circuit during a cryptographic operation to alter its behavior. In this regard, we introduce a new fault detection approach based on time redundancy for the Montgomery Elliptic Curve Scalar Multiplication algorithm. We divided the ECC design into three blocks with registers placed between them. When compared to the original Montgomery ECSM algorithm, our solution takes roughly 11.65% more occupied slices overhead but yields a frequency gain of 51.27%.
KW - Elliptic curve cryptography (ECC)
KW - Fault detection method
KW - Fault injection attack
KW - Montgomery ladder
UR - http://www.scopus.com/inward/record.url?scp=85138169896&partnerID=8YFLogxK
U2 - 10.1007/s11042-022-13749-4
DO - 10.1007/s11042-022-13749-4
M3 - Article
AN - SCOPUS:85138169896
SN - 1380-7501
VL - 82
SP - 11973
EP - 11992
JO - Multimedia Tools and Applications
JF - Multimedia Tools and Applications
IS - 8
ER -