• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2023, Volume: 16, Issue: 16, Pages: 1205-1213

Original Article

A Chosen-Provably-Secure Attack-Resistant Light-Weight Digital Signature Based on Elliptical Curve for Resource Constrained Applications

Received Date:23 February 2023, Accepted Date:30 March 2023, Published Date:21 April 2023

Abstract

Objectives: To build a bridge to provide a solution by developing a lightweight ECDSA method that is not only lower in computational aspect but also is more secure than the Zhong’s ECDSA. Methods: The proposed research work performs cryptanalysis of Zhong’s ECDSA and demonstrates that the method fails to withstand MITM attacks. The proposed ECDSA uses only 1 elliptic curve point multiplication ECPM operation, 1 Modular multiplication operation and zero Modular Inverse operations making it lightweight in terms of computational time. Zero inverse operations save computational time as the process involves scalar mathematics which is time-consuming. Findings: Zhong’s ECDSA is not secure. Additionally, the technique takes 13.28% less time to sign data than the suggested ECDSA method. Through proofs, it is shown by comparison of the proposed ECDSA and Zhong’s ECDSA and cryptanalysis that the proposed ECDSA is more applicable in real time. Although Zhong’s Method for Signature verification at the Receiver end takes 8.2% more time, the recommended technique stands out in comparison to Zhong’s ECDSA w.r.t security. Novelty: The work is a detailed expression of the provablysecure attack-resistant light-weight digital signature based on elliptical curve for resource constrained applications. Advancing, the novelty of the work lies in the comparison of the two techniques w.r.t their performance parameters like number of keys generated, time taken to generate keys, number of keys verified, time taken for key verification, time taken for Signature generation and time taken for Signature verification.

Keywords: Digital signature; MITM; ECDSA; Replay attacks; Forgery attacks

References

  1. Mahmoud AY. A Novel Hash Functions for Data Integrity Based on Affine Hill Cipher and Tensor Product. International Journal of Engineering Trends and Technology. 2022;70(11):1–9. Available from: https://doi.org/10.14445/22315381/IJETT-V70I11P201
  2. Gadde S, Amutharaj J, Usha S. A Hybrid Cryptography Technique for Cloud Data Security. International Journal of Engineering Trends and Technology. 2022;70(11):258–267. Available from: https://doi.org/10.14445/22315381/IJETT-V70I11P228
  3. Gattoju S, Nagalakshmi V, . An efficient approach for bigdata security based on Hadoop system using cryptographic techniques. Indian Journal of Computer Science and Engineering. 2021;12(4):1027–1037. Available from: https://doi.org/10.21817/indjcse/2021/v12i4/211204132
  4. Bedoui M, Bouallegue B, Ahmed AM, Hamdi B, Machhout M, Mahmoud, et al. A Secure Hardware Implementation for Elliptic Curve Digital Signature Algorithm. Computer Systems Science and Engineering. 2023;44(3):2177–2193. Available from: https://doi.org/10.32604/csse.2023.026516
  5. Du H, Wen Q, Zhang S, Gao M. A new provably secure certificateless signature scheme for Internet of Things. Ad Hoc Networks. 2020;100:102074. Available from: https://doi.org/10.1016/j.adhoc.2020.102074
  6. Noori D, Shakeri H, Torshiz MN. Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment. EURASIP Journal on Information Security. 2020;2020(13):1–11. Available from: https://doi.org/10.1186/s13635-020-00114-x
  7. Singh AK, Solanki A, Nayyar A, Qureshi B. Elliptic Curve Signcryption-Based Mutual Authentication Protocol for Smart Cards. Applied Sciences. 2020;10(22):8291. Available from: https://doi.org/10.3390/app10228291
  8. Jammula M, Vakamulla VM, Kondoju SK. Artificial intelligence framework‐based ultra‐lightweight communication protocol for prediction of attacks in <scp>Internet of Things</scp> environment. Transactions on Emerging Telecommunications Technologies. 2023;34(1):4680. Available from: https://doi.org/10.1002/ett.4680
  9. Shah TA, Ullah I, Khan MA, Lorenz P, Innab N. An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things. Journal of Sensor and Actuator Networks. 2023;12(1):10. Available from: https://doi.org/10.3390/jsan12010010
  10. Wang Z, Zhao J, Sun P, Yang J, Wang R, Zhang X. A Lightweight Three-Party Mutual Authentication Protocol for Internet of Health Things Systems. Journal of Healthcare Engineering. 2023;2023:1–15. Available from: https://doi.org/10.1155/2023/1044282
  11. Zhong H, Zhao R, Cui J, Jiang X, Gao J. An Improved ECDSA Scheme for Wireless Sensor Network. International Journal of Future Generation Communication and Networking. 2016;9(2):73–82. Available from: http://article.nadiapub.com/IJFGCN/vol9_no2/8.pdf

Copyright

© 2023 Toradmalle & Amarendra. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Published By Indian Society for Education and Environment (iSee

DON'T MISS OUT!

Subscribe now for latest articles and news.