Implementation Methodology of ECC to Overcome Side Channel Attacks

  • Authors

    • M Maheswari
    • R A. Karthika
    • Anuska Chatterjee
    2018-08-15
    https://doi.org/10.14419/ijet.v7i3.27.17989
  • elliptic curve cyptography, side channel attacks.
  • Abstract

    Elliptic Curve Cryptography (ECC) is a form of public-key cryptography. This implies that there is the involvement of a private key and a public key for the purpose of cryptography. ECC can be used for a wide range of applications. The keys used are much smaller than the non-ECC cryptographic algorithms. 256 bit and 384 bit ECC are used by NSA for storage of classified intel as ECC is considered to be a part of suit B cryptography by the NSA. When it comes to normal usage, other versions of ECC are used. So, many of the applications protected by ECC are vulnerable to side channel attacks. So, the objective is to modify the existing method of implementation of ECC is some regular domains like media, smart grid, etc., such that the side-channel attacks [7], [3] vulnerabilities are fixed.

     

     

  • References

    1. [1] Schmidt JM & Medwed M, “A fault attack on ECDSAâ€, Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), (2009), pp.93-99.

      [2] Zode PP & Deshmukh RB, “Novel fault attack resistant Elliptic Curve processor architectureâ€, Annual IEEE India Conference (INDICON), (2014), pp.1-6.

      [3] Reddy EK, “Overview of the side channel attacksâ€, International Journal of Advanced Networking and Applications, Vol.4, No.6, (2013).

      [4] Will MA, Ko RK & Schlickmann SJ, “Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptographyâ€, IEEE Trustcom/BigDataSE/ICESS, (2017), pp.1024-1031.

      [5] Harkanson R & Kim Y, “Applications of EllipticCurve Cryptographyâ€, CISRC, (2017).

      [6] Agrawal D, Archambeault B, Rao JR & Rohatgi P, “The EM Side-Channel(s) Attacks and Assessment Methodologiesâ€, Internet Security Group, IBM Watsonsearch Center.

      [7] Pourazarm S & Cassandras CG, “Energy-Based Lifetime Maximization and Security of Wireless-Sensor Networks With General Nonideal Battery Modelsâ€, IEEE Transactions on Control of Network Systems, Vol.4, No.2,(2017), pp.323-335.

      [8] Panda M, “Data security in wireless sensor networks via AES algorithmâ€, IEEE 9th International Conference on Intelligent Systems and Control (ISCO), (2015), pp.1-5.

      [9] Wu J, Ota K, Dong M & Li C, “A hierarchical security framework for defending against sophisticated attacks on wireless sensor networks in smart citiesâ€, IEEE Access, Vol.4, (2016), pp.416-424.

      [10] D, Ibrayeva, Z Salkhanova, B Joldasbekova, Zh Bayanbayeva (2018). The specifics of the art autobiography genre. Opción, Año 33. 126-151.

      [11] Z Yesembayeva (2018). Determination of the pedagogical conditions for forming the readiness of future primary school teachers, Opción, Año 33. 475-499

  • Downloads

  • How to Cite

    Maheswari, M., A. Karthika, R., & Chatterjee, A. (2018). Implementation Methodology of ECC to Overcome Side Channel Attacks. International Journal of Engineering & Technology, 7(3.27), 421-423. https://doi.org/10.14419/ijet.v7i3.27.17989

    Received date: 2018-08-20

    Accepted date: 2018-08-20

    Published date: 2018-08-15