An ECC with error detection and against side channel attacks for resource constrained devices

As more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional encryption schemes, elliptic curve cryptography (ECC) pro...

Full description

Bibliographic Details
Published in:Journal of King Saud University: Computer and Information Sciences
Main Authors: Jun Ye, Zewen Yang
Format: Article
Language:English
Published: Springer 2024-04-01
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S1319157824001083
Description
Summary:As more devices are integrated into the Internet of Things (IoT) ecosystem, accurate and efficient information transmission between resource-constrained equipment has become particularly important. For data encryption, compared to traditional encryption schemes, elliptic curve cryptography (ECC) provides a higher security level with the same key size and invokes lower requirements in memory size, making ECC a desirable candidate. Since data transmission is inescapably suffered from electronic interference, communication attacks, and other elements, resulting in imperfections and inaccuracy of information transmission. Applying ECC in resource-constrained devices requires an error detection and correction mechanism, and it also needs to against side channel attacks. In this paper, an improved elliptic curve encryption scheme with an error detection and correction mechanism is proposed. Error detection is facilitated by an enhanced Montgomery ladder algorithm, while error correction is implemented through recomputation. Additionally, to safeguard against side-channel attacks, a technique of base point blinding via randomization is employed. This innovative scheme achieves a 100% error detection rate and offers robust defense against SSCA, DPA, RPA, ZPA, and Relative Doubling Attack. It has been demonstrated to surpass the efficiency and security of existing schemes, making it well-suited for deployment in devices with limited resources.
ISSN:1319-1578