Research on Elliptic Curve Crypto System with Bitcoin Curves – SECP256k1, NIST256p, NIST521p and LLL

نویسندگان

چکیده

Very recent attacks like ladder leak demonstrated feasibility to recover private key with side channel using just one bit of secret nonce. ECDSA nonce bias can be exploited in many ways. Some on involve complicated Fourier analysis and lattice mathematics. In this paper will enable cryptographers identify efficient ways which cracked curves NIST256p, SECP256k1, NIST521p weak nonce, kind that crack how protect yourself. Initially we begin signature sign a message validate the generated shared public key. Then use or random value randomize signature. Every time sign, new verifiable is created way intruder discover if signer leaks any value. Lenstra–Lenstra–Lovasz (LLL) method as black box, try attack signatures from bad number generator (RAG) SECP256k1 curves. The performed by considering all three for implementation Elliptic Curve Digital Signature Algorithm (ECDSA).The comparative each selected terms computational done ECDSA. average costs break are 0.016, 0.34, 0.46 respectively almost zero depicts strength algorithm. SECP256K1 NIST256p LLL 2.9 3.4 respectively.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Elliptic Curve Crypto-processor

In this paper, we propose an elliptic curve key generation processor over GF(2 163 ) scheme based on the Montgomery scalar multiplication algorithm. The new architecture is performed using polynomial basis. The Finite Field operations use a cellular automata multiplier and Fermat algorithm for inversion. For real time implementation, the architecture has been tested on an ISE 9.1 Software using...

متن کامل

Reconfigurable Implementation of Elliptic Curve Crypto Algorithms

For FPGA based coprocessors for elliptic curve cryptography, a significant performance gain can be achieved when hybrid coordinates are used to represent points on the elliptic curve. We provide a new area/performance tradeoff analysis of different hybrid representations over fields of characteristic two. Moreover, we present a new generic cryptoprocessor architecture that can be adapted to var...

متن کامل

Compact and Scalable Elliptic Curve Crypto Processor in Binary Field

Elliptic Curve Cryptography plays a vital role in securing the information for the past two decades. Implementing ECC in hardware is more efficient than software. A processor is said to be compact, if its implementation space is small compared to its execution speed and is scalable if this processor is used with different key sizes. Different metrics such as execution time, implementation space...

متن کامل

A power-optimized low-energy elliptic-curve crypto-processor

This paper presents a low-energy prime-field elliptic-curve cryptography (ECC) hardware processor, suitable for low-power and/or energy-efficient applications and systems. The ECC processor is obtained by power-optimizing a previously reported design. The optimization is performed by making the power consumption profile of the processor as uniform as possible, in an attempt to increase the seco...

متن کامل

VLSI core architecture for GF(p) elliptic curve crypto processor

A novel GF(p) crypto processor core architecture is presented in this paper. The core is used to implement GF(p) Elliptic Curve Cryptosystem (ECC). The architecture is such that a single core can be used to implement ECC or alternatively a two core solution can be adopted. As a result, the core architecture allows the exploitation of the parallelism that exists in elliptic curve point addition ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of cyber security and mobility

سال: 2023

ISSN: ['2245-1439', '2245-4578']

DOI: https://doi.org/10.13052/jcsm2245-1439.1215