Security through Elliptic Curves for Wireless Network in Mobile Devices

Abstract

The basic principle is “A function is easy to evaluate but its invert is infeasible unless a secret key is known”.

It is mathematically proved that security of cryptographic does not imply its implementation security of system against Side-channel Attacks. The security of system lies in the difficulty of extracting k from P and Q. It is essential to secure the implementation of cryptosystems in embedded devices against side-channel attacks. These attacks monitor the power consumption or the Electromagnetic emanations of a device Ex smart cards or mobile devices. The attacker’s goal is to retrieve partial or full information about a long-term key that is employed in several ECSM executions.

We are implementing a secret key avoid to retrieving the valuable information by the attacker through Simple Power Analysis Attacks.

Keywords

Differential Power analysis, Elliptic curve cryptography, Simple power Analysis

  • License

    Creative Commons Attribution 4.0 (CC BY 4.0)

  • Language & Pages

    English, 65-70

  • Classification

    ACM Code: C.2.0