Enhancement security level and hardware implementation of ECDSA

Elliptic Curve Digital Signature Algorithm (ECDSA) provides several security services for resource-constrained embedded devices. It can be the target of attacks as Side-channel attacks. The ECDSA level security can be enhanced by tuning several parameters as key size and the security level of each ECDSA elementary modules such as point multiplication, hash function and pseudo random number generators (PRNG). This paper presents conception and hardware implementation of ECDSA taking in consideration requirements related to correlation between key size and security level according to academic and private organizations. In this work, we have considered a key size equal to 233 bit, Montgomery point multiplication technique and hashing functions SHA-224. The ECDSA design is implemented on a reconfigurable hardware platform (Xilinx xc6vlx760-2ff1760). We used the hardware description language VHDL for compartmental validation. The implementation results illustrate security evaluation and hardware performances in terms of time computation and area occupation.

[1]  Martin Feldhofer,et al.  An ECDSA Processor for RFID Authentication , 2010, RFIDSec.

[2]  Ricardo Dahab,et al.  Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation , 1999, CHES.

[3]  Klaus D. Müller-Glaser,et al.  Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems , 2011, Int. J. Reconfigurable Comput..

[4]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[5]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[6]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[7]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[8]  Elaine B. Barker,et al.  Recommendation for key management: , 2019 .

[9]  Vincent Rijmen,et al.  ECRYPT yearly report on algorithms and keysizes , 2009 .

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[14]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[15]  R. Shanmugalakshmi,et al.  Research Issues on Elliptic Curve Cryptography and Its applications , 2009 .

[16]  Elaine B. Barker Digital Signature Standard (DSS) [includes Change Notice 1 from 12/30/1996] | NIST , 1994 .

[17]  Mehari Hadis Cryptoprocessor for Elliptic Curve Digital Signature Algorithm using FPGA , 2013 .

[18]  Sarang Aravamuthan,et al.  A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.