Application of Lenstra–Lenstra–Lovasz on Elliptic Curve Cryptosystem Using IOT Sensor Nodes

Authors

  • Md Sameeruddin Khan Post-Doctoral fellow, City, University of London, United Kingdom and Pro-Vice chancellor & Dean at School of Computer Science and Engineering, Presidency University, Bengaluru, Karnataka, India
  • Thomas M. Chen Professor, Cyber Security, City, University of London, United Kingdom
  • Mithileysh Sathiyanarayanan University of Brighton, U.K
  • Mohammed Mujeerulla Associate Professor, School of Computer Science and Engineering, Presidency University, Bengaluru, Karnataka, India
  • S. Pravinth Raja Post-Doctoral fellow, City, University of London, United Kingdom and Professor & Head of the Department, School of Computer Science and Engineering, Presidency University, Bengaluru, Karnataka, India

DOI:

https://doi.org/10.13052/jicts2245-800X.1242

Keywords:

RAG – Random number generator, EdDSA – edwards curve digital signature algorithm nonce – number only used once, The NIST – National Institute of Standards and Technology, SEC – U.S. securities and exchange commission, ECC – elliptic curve cryptography, IoT – Internet of Things

Abstract

The Internet of Things (IoT) model is presented in this paper with multi-layer security based on the Lenstra-Lenstra-Lovasz (LLL) algorithm. End nodes for the Internet of Things include inexpensive gadgets like the Raspberry Pi and Arduino boards. It is not practical to run rigorous algorithms on them, as opposed to computer systems. Therefore, a cryptography procedure is required that could function on this IOT equipment. Bitcoins and Ethereum are examples of cryptocurrency and Ripple employs techniques such as elliptic curve digital signature, Elliptic-Curve Diffie-Hellman (ECDH), and algorithm to sign any cryptocurrency on SECP256k1 elliptic curves transactions. By using Lenstra-Lenstra-Lovasz on a real-world Bitcoin blockchain and applying it to multiple dimensions, such as nonce leakage and weak nonces across several elliptic curves with different bit sizes on a Raspberry Pi, we can demonstrate the security of elliptic curve cryptosystems. Public key encryption techniques are seriously threatened by the development of quantum computing. Therefore, employing lattice encryption with Nth Degree Truncated Polynomial Ring Units (NTRU-NTH) on the Bitcoin blockchain will increase the resistance of Bitcoin blocks to quantum computing assaults. The execution time taken on SECP256k1 is 131.7 Milli seconds comparatively faster than NIST-224P and NIST-384P.

Downloads

Download data is not yet available.

Author Biographies

Md Sameeruddin Khan, Post-Doctoral fellow, City, University of London, United Kingdom and Pro-Vice chancellor & Dean at School of Computer Science and Engineering, Presidency University, Bengaluru, Karnataka, India

Md Sameeruddin Khan (Senior Member, IEEE) is currently serving as Pro-Vice chancellor and Dean at school of computer science and engineering, Presidency university, Bangalore. In 2019 he pursued his Doctor of Philosophy in Computer Science and Engineering from Rayalaseema University, Kurnool, Andhra Pradesh and in 2001 he pursued his master of Technology in Computer Science and Engineering from Visveswaraih Technological University, Belgaum. He has many papers to his credit in reputed international journals and conferences. His areas of expertise include internet of things, wireless sensor network and cryptography.

Thomas M. Chen, Professor, Cyber Security, City, University of London, United Kingdom

Thomas M. Chen (Senior Member, IEEE) is currently a Professor in cyber security with the City, University of London. Previously, he was a Senior Technical Member of Staff with the GTE Laboratories (now Verizon), Waltham, MA, USA. He joined Southern Methodist University, Dallas, as an Associate Professor and then Swansea University, Wales, as a Professor in networks. He has written or edited seven books, 41 book chapters, and owns two U.S. patents. His research interests include cyber security, online extremism, and computer networks. He was a co-recipient of the Fred W. Ellersick Best Paper Award, in 1996. He has served as the former Editor-in-Chief for IEEE Communications Magazine, IEEE Network, and IEEE Communications Surveys and Tutorials.

Mithileysh Sathiyanarayanan, University of Brighton, U.K

Mithileysh Sathiyanarayanan (Member, IEEE) received the Ph.D. degree from the City, University of London. He completed his pre-doctoral fellowship from the University of Brighton, U.K. He is currently an Indian-Born Research Scientist and an Entrepreneur in London. He closely works with “MAKE IN INDIA” initiatives through his organization, MIT Square. Being the Founder and the CEO, his vision is to build Indian products and take it to the world. His research was in collaboration with the Nokia Research, Finland, which won him “Young Scientist Award.” He has also won several research awards, entrepreneurship awards, and has been invited as a research consultant at various industries for his research excellence. At an age of 19, he started his career as a Social Entrepreneur and now mentoring several institutions and budding engineers in India. Recently, he was awarded International Achievers Award 2020 and the CEO of the Year 2021 for his innovation and product development. His diligence and stark sight have achieved his startup the recognition as the one of the fastest growing startups in India.,Dr. Sathiyanarayanan has been awarded with several prestigious awards, being a Scientist, a CEO, an Entrepreneur, a Mentor, an Author, and an Educationist among other hats, he wears. This gentleman has accumulated knowledge and experience across multiple industries at a young age and is now putting it all to together to brighten India’s tomorrow.

Mohammed Mujeerulla, Associate Professor, School of Computer Science and Engineering, Presidency University, Bengaluru, Karnataka, India

Mohammed Mujeerulla has perceived his doctoral in 2023 from Presidency university, Bangalore and his masters and bachelors degree in computer science and engineering from R.V college of engineering, Bangalore, India in 2015 and 2008 respectively. Since 2017 he is working as associate professor in presidency university Bangalore. He has many papers to his credit in reputed international journals and conferences. His areas of expertise include internet of things, wireless sensor network and cryptography.

S. Pravinth Raja, Post-Doctoral fellow, City, University of London, United Kingdom and Professor & Head of the Department, School of Computer Science and Engineering, Presidency University, Bengaluru, Karnataka, India

Dr. S. Pravinth Raja has over 18 years of experience in teaching and research. He is currently serving as a Professor and the Head of the Department of Computer Science and Engineering at Presidency University. Dr. Pravinth Raja completed his Ph.D. in 2017 at Anna University, Chennai, and later pursued a Postdoctoral Fellowship at City University of London, UK, which he successfully completed in 2023. He has received a research grant of 26 lakhs from the Government of India under the T10KT training program. With more than 50 research articles published in prestigious Q1, Q2, Q3, and Q4 journals and conferences, he has made significant contributions to his field. Additionally, he holds over 16 patents, of which 4 have been granted in the UK, India, and Australia. Dr. Pravinth Raja has supervised 3 Ph.D. scholars and his primary research interests include image processing and machine learning.

References

Chintan Patel, Nishant Doshi. Secure Light Weight Key Ex-Change Using ECC For User Gateway Paradigm “IEEE Transactions on Computer” DOI: 10.1109/TC.2020.3026027 (2021).

Mohammed Mujeer Ulla; Preethi; Md. Sameeruddin Khan; Deepak S. Sakkari. Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL “Journal of ICT Standardization, River Publications,” ISSN: 2246-0853. DOI: 10.13052/jicts2245-800X.1141 (2024).

Mohammed Mujeer Ulla; Preethi; Md. Sameeruddin Khan; Deepak S. Sakkari. Demerits of Elliptic Curve Cryptosystem with Bitcoin Curves Using Lenstra–Lenstra–Lovasz (LLL) Lattice Basis Reduction “Arabian Journal for Science and Engineering”. https://doi.org/10.1007/s13369-023-08116-w (2023).

Mohammed Mujeer Ulla and Deepak S. Sakkari. Application of Elliptic Curve Crypto System to Secure Multi-Signature Bitcoin Block Chain “Journal of Computer Science, Science Publications”, ISSN: 1552-6607. https://doi.org/10.3844/jcssp.2023.112.125 (2023).

Kamal, A., Ahmad, K., Hassan, R., Khalim, K. NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units. In: Ahmad, “EAI/Springer Innovations in Communication and Computing”. Springer, Cham, https://doi.org/10.1007/978-3-030-60890-3_6 (2021).

Nizar Ouni and Ridha Bouallegue. Performance and Complexity Analysis of Reduced Iterations LLL Algorithm “International Journal of Computer Networks Communications (IJCNC)” May Vol.8. DOI: 10.5121/ijcnc.2016.8309 (2016).

Yunju Park and Jaehyen, Analysis of the upper bound on the complexity of LLL Algorithm, “Journal of the Korean Society for Industrial and Applied Mathematics” Vol. 20, No. 2, 107–121. DOI: 10.12941/jksiam.2016.20.107 (2016).

Wei, L.; Li, D.; Liu, Z. Provable Secure Attribute-Based Proxy Signature Over Lattice Small Integer Solution Problem in Random Oracle Model. “Electronics”, 12, 1619. https://doi.org/10.3390/electronics12071619. (2023).

Mohammed Mujeer ulla, Md Sameeruddin Khan, Preethi, and Deepak S.Sakkari. Security and Performance Analysis of Elliptic Curve Crypto System using Bitcoin Curves. “IAENG International Journal of Computer Science”, ISSN: 1819-656X. (2023).

Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally and Youcef Begriche. A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT), “IEEE Systems Journal” Pages: 3440–3450 DOI: 10.1109/JSYST.2020.2970167 Volume: 14. (2020).

Xiaoqiang Zhang And Xuesong Wang. Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem. “IEEE Access Pages: 70025 – 70034” ISSN: 2169-3536 Volume:6. DOI: 10.1109/ACCESS.2018.2879844 (2018).

Mohammad Ayoub Khan, Mohammed Tabrez Quasim, Norah Saleh Alghamdi, Mohammad Yahiya Khan, A Secure Framework for Authentication and Encryption Using Improved ECC for IoT- Based Medical Sensor Data. “IEEE Access Pages: 52018 – 52027” ISSN: 2169-3536 Volume: 8. DOI: 10.1109/ACCESS.2020.2980739 (2020).

Michael Brengel and Christian Rossow. Identifying Key Leak- Age of Bitcoin Users. International Symposium on Research in Attacks, Intrusions, and Defenses. “Open Access LNSC”, ISBN: 978-3-030-00470-5 volume 11050. DOI: 10.1007/978-3-030-00470-5_29. (2018)

Joachim Breitner and Nadia Heninger Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies, “Lecture Notes in Computer Science Springer International Publishing -Financial Cryptography and Data Security”. DOI: 10.1007/978-3-030-32101-7_1. (2019).

Javed R. Shaikh, Maria Nenova, Georgi Iliev and Zlatka Valkova-Jarvis. Analysis of Standard Elliptic Curves for the Implementation of Elliptic Curve Cryptography in Resource-Constrained E-commerce Applications. “IEEE-COMCAS” ISBN:978-1-5386-3169-0. DOI: 10.1109/COMCAS.2017.8244805. (2017).

Shen Guicheng, Yu Zhen. Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things. “IEEE-IIHMSP” ISBN:978-0-7695-5120-3 DOI: 10.1109/IIH-MSP.2013.118. (2013).

Ravi Kishore Kodali and Ashwitha Naikoti. ECDH-based Security Model for IoT using ESP 8266. “IEEE- ICCICCT” DOI: 10.1109/ICCICCT.2016.7988026 (2016).

Deepak S. Sakkari Mohammed Mujeer ulla. Review on Insight into Elliptic Curve Cryptography. “Modern Approaches in Machine Learning Cognitive Science: A Walkthrough” DOI: 10.1007/978-3-030-96634-88 (2022).

Deepak S. Sakkari Mohammed Mujeer ulla Design and Implementation of Identifying Points on Elliptic Curve Efficiently Using Java. “Modern Approaches in Machine Learning Cognitive Science: A Walkthrough” DOI: 10.1007/978-3-030-96634-88. (2022).

Deepak S. Sakkari Mohammed Mujeer ulla. Design and Implementation of Elliptic Curve Digital Signature Using BitCoin Curves Secp256K1 and Secp384R1 for Base10 and Base16 Using Java. “Innovation in Electrical Power Engineering, Communication, and Computing Technology” DOI: 10.1007/978-981-16-7076-328 (2022).

Downloads

Published

2025-02-19

How to Cite

Khan, M. S. ., Chen, T. M. ., Sathiyanarayanan, M. ., Mujeerulla, M. ., & Raja, S. P. . (2025). Application of Lenstra–Lenstra–Lovasz on Elliptic Curve Cryptosystem Using IOT Sensor Nodes. Journal of ICT Standardization, 12(04), 381–408. https://doi.org/10.13052/jicts2245-800X.1242

Issue

Section

Articles