Filters








142 Hits in 2.8 sec

An ECDSA Processor for RFID Authentication [chapter]

Michael Hutter, Martin Feldhofer, Thomas Plos
2010 Lecture Notes in Computer Science  
This paper presents first results of an 192-bit Elliptic Curve Digital Signature Algorithm (ECDSA) processor that allows both entity and also message authentication by digitally signing challenges from  ...  Many of the proposed implementations include elliptic-curve based coprocessors to provide entity-authentication services through for example identification schemes.  ...  The authors would like to thank Johannes Wolkerstorfer and Marcel Medwed for their valuable inputs and discussions.  ... 
doi:10.1007/978-3-642-16822-2_16 fatcat:qzeo6u35ejhpbh5gabpsnnlnhq

Elliptical Curve Digital Signatures Algorithm

Prajna D
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
The survey of ECDSA involves major issues like security of cryptosystem, RFID-tag authentication, Montgomery multiplication over binary fields, Scaling techniques, Signature generation ,signature verification  ...  This paper describes novel security approach on authentication schemes as a modification of ECDSA scheme.  ...  processor on Fp for RFID authentication only to signs a message within 859188 clock cycles is implemented RFID using microcontroller and with integrated AES(Advance Encryption standard) a challenge responsive  ... 
doi:10.17762/ijritcc2321-8169.1503180 fatcat:5ncm73qzy5et3mdtm5qullwnsq

An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP

Alaauldin Ibrahim, Gökhan Dalkılıç
2017 Journal of Sensors  
In this paper, we propose a mutual authentication protocol for RFID tags based on elliptic curve cryptography and advanced encryption standard.  ...  The proposed protocol is not simply a theoretical construct; it has been coded and tested on an experimental RFID tag.  ...  In the same year, Lee and Chien [26] proposed an ECC-based RFID authentication protocol for e-health and reported that He et al. 's protocol [21] is vulnerable to active tracking attacks.  ... 
doi:10.1155/2017/2367312 fatcat:bfiqtgraj5ecre7dnwq7uhsqsi

A Comprehensive and Comparative Study of Elliptic Curve Cryptography Hardware Implementations for WSN

Nabil Ghanmy, Lamia Chaari Fourati, Lotfi Kamoun
2014 International Journal of RFID Security and Cryptography  
Key management and authentication are essential modules for network security provisioning especially for Wireless Sensor Networks (WSN).  ...  The main focus of this paper is to provide a comprehensive use and comparative hardware implementation study of ECC for WSN security.  ...  In 2008 Murphy et al. [40] present an area-efficient processor for performing RSA and ECC operations for constrained platforms such as WSN.  ... 
doi:10.20533/ijrfidsc.2046.3715.2014.0014 fatcat:4twsjd7hurbqvdcjlhpcogsyey

Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography

Thomas Plos, Michael Hutter, Martin Feldhofer, Maksimiljan Stiglic, Francesco Cavaliere
2013 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
The tag design contains all hardware modules required for a practical realization, which are: an analog 13.56 MHz Radio-Frequency Identification (RFID) front-end, a digital part including a tiny (programmable  ...  goods or to provide location-aware services using RFID technology.  ...  ACKNOWLEDGMENT The authors would like to thank Johannes Wolkerstorfer, Manfred Aigner, Jörn-Marc Schmidt, and Nikolaus Ribic for their contributions within this project and for very fruitful discussions  ... 
doi:10.1109/tvlsi.2012.2227849 fatcat:sahsybcl4bdb3iztme5knjhv7a

Efficient and Secure ECDSA Algorithm and its Applications: A Survey [article]

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
2019 arXiv   pre-print
This paper presents detailed and a comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications.  ...  Public-key cryptography algorithms, especially elliptic curve cryptography (ECC) and elliptic curve digital signature algorithm (ECDSA) have been attracting attention from many researchers in different  ...  This processor has security services (authentication, integrity, and non-repudiation). Authors used this processor to authenticate between tag reader and RFID tag.  ... 
arXiv:1902.10313v1 fatcat:7k44pfghujbzdmoxpkynavzone

A Cryptographic Processor for Low-Resource Devices: Canning ECDSA and AES Like Sardines [chapter]

Michael Hutter, Martin Feldhofer, Johannes Wolkerstorfer
2011 Lecture Notes in Computer Science  
In this paper, we present a hardware implementation of a low-resource cryptographic processor that provides both digital signature generation using ECDSA and encryption/decryption services using AES.  ...  The proposed processor has a total chip area of 21 502 GEs where AES needs only 2 387 GEs and SHA-1 requires 889 GEs.  ...  ECDSA, which is for example used for secure identification in e-passports, generates digital signatures for message and entity authentication.  ... 
doi:10.1007/978-3-642-21040-2_10 fatcat:dlxkhclihnf3xk2cbv7flga2e4

Design And Implementation of Low Area/Power Elliptic Curve Digital Signature Hardware Core

Anissa Sghaier, Medien Zeghid, Chiraz Massoud, Mohsen Mahchout
2017 Electronics  
The authentication mechanism used the ECDSA algorithm with the IEEE1609.2 standard for vehicular ad hoc networks.  ...  The proposed processor integrates an ECC IP, a Secure Hash Standard 2 IP (SHA-2 Ip) and Random Number Generator IP (RNG IP).  ...  Acknowledgments: We did not receive funds for covering the costs to publish in open access.  ... 
doi:10.3390/electronics6020046 fatcat:6xav2duuwffmnhhhjqkjdumch4

Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks

Rene Mayrhofer, Florian Ortner, Alois Ferscha, Manfred Hechinger
2003 Electronical Notes in Theoretical Computer Science  
The SmartInteraction project is an approach to interact with persons, things and places in a natural and non-obtrusive way.  ...  We introduce a method for integrating such objects into a peer-to-peer environment without infrastructure components while providing a high level of privacy and security for peers interacting with objects  ...  . • All messages from a proxy peer to an ordinary peer (from B to A) are signed, either with ECDSA or RSA using the private key stored on B.  ... 
doi:10.1016/s1571-0661(04)80687-x fatcat:nx6tkmfcfrhatidwripum55rii

ETA

Attila Altay Yavuz
2013 Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks - WiSec '13  
All these properties make ETA an ideal choice to provide authentication and integrity for heterogeneous systems, in which resource-constrained devices produce publicly verifiable signatures that are verified  ...  However, existing digital signatures are not practical for resource-constrained systems (e.g., wireless sensors, RFID-tags).  ...  For instance, guaranteeing the integrity and authentication of financial transactions in a smart-card or RFID-tag is critical for any commercial application.  ... 
doi:10.1145/2462096.2462108 dblp:conf/wisec/Yavuz13 fatcat:e5hoy7cecvhh7egozh3iud2ch4

A Survey on Efficient and Secure Implementation of ECDSA against Fault Attack

Kaushalya J
2020 International Journal of Emerging Trends in Engineering Research  
This paper presents a precise and complete review of an update of the Elliptic Curve Digital Signature (ECDSA) algorithm and fault attack and its countermeasures and describes about the future work to  ...  ACKNOWLEDGMENT Thanks for Ms. A. Suganya, for helping us to focus on this domain, which helped us to learn a lot about ECC.  ...  ECDSA is a best security option. ECDSA provides a security for many attacks. The security requirements are authentication, non-repudiation and integrity.  ... 
doi:10.30534/ijeter/2020/11872020 fatcat:wlqhx3xa5rbefkzsclzpmupduy

Efficient Implementation of Elliptic Curve Cryptography Using Low-power Digital Signal Processor [article]

Muhammad Yasir Malik
2011 arXiv   pre-print
Section V contains ECC implementation on fixed point Digital Signal Processor(TMS320VC5416).  ...  Due to large numbers involved in RSA, there is need for more efficient methods in implementation for public key cryptosystems.  ...  authentication methods.  ... 
arXiv:1109.1877v1 fatcat:aap65n5nyngeji24fuircx6hfu

Securing RDS broadcast messages for smart grid applications

Monageng Kgwadi, Thomas Kunz
2010 Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC '10  
Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE.  ...  In addition, ECDSA has the highest bandwidth overhead. i Carleton University,  ...  Implementations of ECDSA on an 8-bit processor takes 2.78 seconds to verify a signature [19] .  ... 
doi:10.1145/1815396.1815666 dblp:conf/iwcmc/KgwadiK10 fatcat:d7husqma45gs7oegbqt472nc5y

Securing RDS broadcast messages for smart grid applications

Monageng Kgwadi, Thomas Kunz
2011 International Journal of Autonomous and Adaptive Communications Systems  
Beyond that, all the schemes have an effect on message reception due to increased message sizes and receiver bootstrapping for BiBa and HORSE.  ...  In addition, ECDSA has the highest bandwidth overhead. i Carleton University,  ...  Implementations of ECDSA on an 8-bit processor takes 2.78 seconds to verify a signature [19] .  ... 
doi:10.1504/ijaacs.2011.043480 fatcat:l27lm6mo3jfr7e7p6sselvpwji

RFID-Tags for Anti-counterfeiting [chapter]

Pim Tuyls, Lejla Batina
2006 Lecture Notes in Computer Science  
In this paper, we investigate how an RFID-tag can be made unclonable by linking it inseparably to a Physical Unclonable Function (PUF).  ...  We focus on off-line authentication because it is very attractive from a practical point of view. We show that a PUF based solution for RFID-tags is feasible in the off-line case.  ...  We identify the technological components of anti-counterfeiting technology and give a general protocol for verifying the authenticity of an item. 2.  ... 
doi:10.1007/11605805_8 fatcat:g226k7ilwjf75aly5b36vqfh7i
« Previous Showing results 1 — 15 out of 142 results