White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode

White-box attack context assumes that the running environments of algorithms are visible and modifiable. Algorithms that can resist the white-box attack context are called white-box cryptography. The elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature...

Full description

Bibliographic Details
Main Authors: Jie Zhou, Jian Bai, Meng Shan Jiang
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/8881116
id doaj-9b5caee383be477897b31588a2951df3
record_format Article
spelling doaj-9b5caee383be477897b31588a2951df32020-11-30T09:11:20ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/88811168881116White-Box Implementation of ECDSA Based on the Cloud Plus Side ModeJie Zhou0Jian Bai1Meng Shan Jiang2School of Computer and Software Engineering, Xihua University, Chengdu 610039, ChinaChina Electronic Technology Cyber Security Co., Ltd., Chengdu 610041, ChinaChina Electronic Technology Cyber Security Co., Ltd., Chengdu 610041, ChinaWhite-box attack context assumes that the running environments of algorithms are visible and modifiable. Algorithms that can resist the white-box attack context are called white-box cryptography. The elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature algorithms which can provide integrity, authenticity, and nonrepudiation. Since the private key in the classical ECDSA is plaintext, it is easy for attackers to obtain the private key. To increase the security of the private key under the white-box attack context, this article presents an algorithm for the white-box implementation of ECDSA. It uses the lookup table technology and the “cloud plus side” mode to protect the private key. The residue number system (RNS) theory is used to reduce the size of storage. Moreover, the article analyzes the security of the proposed algorithm against an exhaustive search attack, a random number attack, a code lifting attack, and so on. The efficiency of the proposed scheme is compared with that of the classical ECDSA through experiments.http://dx.doi.org/10.1155/2020/8881116
collection DOAJ
language English
format Article
sources DOAJ
author Jie Zhou
Jian Bai
Meng Shan Jiang
spellingShingle Jie Zhou
Jian Bai
Meng Shan Jiang
White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
Security and Communication Networks
author_facet Jie Zhou
Jian Bai
Meng Shan Jiang
author_sort Jie Zhou
title White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
title_short White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
title_full White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
title_fullStr White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
title_full_unstemmed White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode
title_sort white-box implementation of ecdsa based on the cloud plus side mode
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description White-box attack context assumes that the running environments of algorithms are visible and modifiable. Algorithms that can resist the white-box attack context are called white-box cryptography. The elliptic curve digital signature algorithm (ECDSA) is one of the most widely used digital signature algorithms which can provide integrity, authenticity, and nonrepudiation. Since the private key in the classical ECDSA is plaintext, it is easy for attackers to obtain the private key. To increase the security of the private key under the white-box attack context, this article presents an algorithm for the white-box implementation of ECDSA. It uses the lookup table technology and the “cloud plus side” mode to protect the private key. The residue number system (RNS) theory is used to reduce the size of storage. Moreover, the article analyzes the security of the proposed algorithm against an exhaustive search attack, a random number attack, a code lifting attack, and so on. The efficiency of the proposed scheme is compared with that of the classical ECDSA through experiments.
url http://dx.doi.org/10.1155/2020/8881116
work_keys_str_mv AT jiezhou whiteboximplementationofecdsabasedonthecloudplussidemode
AT jianbai whiteboximplementationofecdsabasedonthecloudplussidemode
AT mengshanjiang whiteboximplementationofecdsabasedonthecloudplussidemode
_version_ 1715028073552805888