White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
White-box attack context assumes that the running environments of algorithms are visible and modifiable. Algorithms that can resist the white-box attack context are called white-box cryptography. The elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/8881116 |
id |
doaj-9b5caee383be477897b31588a2951df3 |
---|---|
record_format |
Article |
spelling |
doaj-9b5caee383be477897b31588a2951df32020-11-30T09:11:20ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/88811168881116White-Box Implementation of ECDSA Based on the Cloud Plus Side ModeJie Zhou0Jian Bai1Meng Shan Jiang2School of Computer and Software Engineering, Xihua University, Chengdu 610039, ChinaChina Electronic Technology Cyber Security Co., Ltd., Chengdu 610041, ChinaChina Electronic Technology Cyber Security Co., Ltd., Chengdu 610041, ChinaWhite-box attack context assumes that the running environments of algorithms are visible and modifiable. Algorithms that can resist the white-box attack context are called white-box cryptography. The elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature algorithms which can provide integrity, authenticity, and nonrepudiation. Since the private key in the classical ECDSA is plaintext, it is easy for attackers to obtain the private key. To increase the security of the private key under the white-box attack context, this article presents an algorithm for the white-box implementation of ECDSA. It uses the lookup table technology and the “cloud plus side” mode to protect the private key. The residue number system (RNS) theory is used to reduce the size of storage. Moreover, the article analyzes the security of the proposed algorithm against an exhaustive search attack, a random number attack, a code lifting attack, and so on. The efficiency of the proposed scheme is compared with that of the classical ECDSA through experiments.http://dx.doi.org/10.1155/2020/8881116 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jie Zhou Jian Bai Meng Shan Jiang |
spellingShingle |
Jie Zhou Jian Bai Meng Shan Jiang White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode Security and Communication Networks |
author_facet |
Jie Zhou Jian Bai Meng Shan Jiang |
author_sort |
Jie Zhou |
title |
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode |
title_short |
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode |
title_full |
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode |
title_fullStr |
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode |
title_full_unstemmed |
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode |
title_sort |
white-box implementation of ecdsa based on the cloud plus side mode |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2020-01-01 |
description |
White-box attack context assumes that the running environments of algorithms are visible and modifiable. Algorithms that can resist the white-box attack context are called white-box cryptography. The elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature algorithms which can provide integrity, authenticity, and nonrepudiation. Since the private key in the classical ECDSA is plaintext, it is easy for attackers to obtain the private key. To increase the security of the private key under the white-box attack context, this article presents an algorithm for the white-box implementation of ECDSA. It uses the lookup table technology and the “cloud plus side” mode to protect the private key. The residue number system (RNS) theory is used to reduce the size of storage. Moreover, the article analyzes the security of the proposed algorithm against an exhaustive search attack, a random number attack, a code lifting attack, and so on. The efficiency of the proposed scheme is compared with that of the classical ECDSA through experiments. |
url |
http://dx.doi.org/10.1155/2020/8881116 |
work_keys_str_mv |
AT jiezhou whiteboximplementationofecdsabasedonthecloudplussidemode AT jianbai whiteboximplementationofecdsabasedonthecloudplussidemode AT mengshanjiang whiteboximplementationofecdsabasedonthecloudplussidemode |
_version_ |
1715028073552805888 |