Security through Elliptic Curves for Wireless Network in Mobile Devices

Article Fingerprint
Research ID P081I

IntelliPaper

Abstract

The basic principle is “A function is easy to evaluate but its invert is infeasible unless a secret key is known”.

It is mathematically proved that security of cryptographic does not imply its implementation security of system against Side-channel Attacks. The security of system lies in the difficulty of extracting k from P and Q. It is essential to secure the implementation of cryptosystems in embedded devices against side-channel attacks. These attacks monitor the power consumption or the Electromagnetic emanations of a device Ex smart cards or mobile devices. The attacker’s goal is to retrieve partial or full information about a long-term key that is employed in several ECSM executions.

We are implementing a secret key avoid to retrieving the valuable information by the attacker through Simple Power Analysis Attacks.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

Not applicable

Data Availability

The datasets used in this study are openly available at [repository link] and the source code is available on GitHub at [GitHub link].

Funding

This work did not receive any external funding.

Cite this article

Generating citation...

Related Research

  • Classification

    ACM Code: C.2.0

  • Version of record

    v1.0

  • Issue date

    20 November 2024

  • Language

    English

Research scientists analyzing DNA structures in a digital environment.
Open Access
Research Article
CC-BY-NC 4.0
LJRCST Volume 24 LJRCST Volume 24 Issue 2, Pg. 65-70
Support