Application of Lenstra–Lenstra–Lovasz on Elliptic Curve Cryptosystem Using IOT Sensor Nodes
DOI:
https://doi.org/10.13052/jicts2245-800X.1242Keywords:
RAG – Random number generator, EdDSA – edwards curve digital signature algorithm nonce – number only used once, The NIST – National Institute of Standards and Technology, SEC – U.S. securities and exchange commission, ECC – elliptic curve cryptography, IoT – Internet of ThingsAbstract
The Internet of Things (IoT) model is presented in this paper with multi-layer security based on the Lenstra-Lenstra-Lovasz (LLL) algorithm. End nodes for the Internet of Things include inexpensive gadgets like the Raspberry Pi and Arduino boards. It is not practical to run rigorous algorithms on them, as opposed to computer systems. Therefore, a cryptography procedure is required that could function on this IOT equipment. Bitcoins and Ethereum are examples of cryptocurrency and Ripple employs techniques such as elliptic curve digital signature, Elliptic-Curve Diffie-Hellman (ECDH), and algorithm to sign any cryptocurrency on SECP256k1 elliptic curves transactions. By using Lenstra-Lenstra-Lovasz on a real-world Bitcoin blockchain and applying it to multiple dimensions, such as nonce leakage and weak nonces across several elliptic curves with different bit sizes on a Raspberry Pi, we can demonstrate the security of elliptic curve cryptosystems. Public key encryption techniques are seriously threatened by the development of quantum computing. Therefore, employing lattice encryption with Nth Degree Truncated Polynomial Ring Units (NTRU-NTH) on the Bitcoin blockchain will increase the resistance of Bitcoin blocks to quantum computing assaults. The execution time taken on SECP256k1 is 131.7 Milli seconds comparatively faster than NIST-224P and NIST-384P.
Downloads
References
Chintan Patel, Nishant Doshi. Secure Light Weight Key Ex-Change Using ECC For User Gateway Paradigm “IEEE Transactions on Computer” DOI: 10.1109/TC.2020.3026027 (2021).
Mohammed Mujeer Ulla; Preethi; Md. Sameeruddin Khan; Deepak S. Sakkari. Implementation of Elliptic Curve Cryptosystem with Bitcoin Curves on SECP256k1, NIST256p, NIST521p, and LLL “Journal of ICT Standardization, River Publications,” ISSN: 2246-0853. DOI: 10.13052/jicts2245-800X.1141 (2024).
Mohammed Mujeer Ulla; Preethi; Md. Sameeruddin Khan; Deepak S. Sakkari. Demerits of Elliptic Curve Cryptosystem with Bitcoin Curves Using Lenstra–Lenstra–Lovasz (LLL) Lattice Basis Reduction “Arabian Journal for Science and Engineering”. https://doi.org/10.1007/s13369-023-08116-w (2023).
Mohammed Mujeer Ulla and Deepak S. Sakkari. Application of Elliptic Curve Crypto System to Secure Multi-Signature Bitcoin Block Chain “Journal of Computer Science, Science Publications”, ISSN: 1552-6607. https://doi.org/10.3844/jcssp.2023.112.125 (2023).
Kamal, A., Ahmad, K., Hassan, R., Khalim, K. NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units. In: Ahmad, “EAI/Springer Innovations in Communication and Computing”. Springer, Cham, https://doi.org/10.1007/978-3-030-60890-3_6 (2021).
Nizar Ouni and Ridha Bouallegue. Performance and Complexity Analysis of Reduced Iterations LLL Algorithm “International Journal of Computer Networks Communications (IJCNC)” May Vol.8. DOI: 10.5121/ijcnc.2016.8309 (2016).
Yunju Park and Jaehyen, Analysis of the upper bound on the complexity of LLL Algorithm, “Journal of the Korean Society for Industrial and Applied Mathematics” Vol. 20, No. 2, 107–121. DOI: 10.12941/jksiam.2016.20.107 (2016).
Wei, L.; Li, D.; Liu, Z. Provable Secure Attribute-Based Proxy Signature Over Lattice Small Integer Solution Problem in Random Oracle Model. “Electronics”, 12, 1619. https://doi.org/10.3390/electronics12071619. (2023).
Mohammed Mujeer ulla, Md Sameeruddin Khan, Preethi, and Deepak S.Sakkari. Security and Performance Analysis of Elliptic Curve Crypto System using Bitcoin Curves. “IAENG International Journal of Computer Science”, ISSN: 1819-656X. (2023).
Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally and Youcef Begriche. A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT), “IEEE Systems Journal” Pages: 3440–3450 DOI: 10.1109/JSYST.2020.2970167 Volume: 14. (2020).
Xiaoqiang Zhang And Xuesong Wang. Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem. “IEEE Access Pages: 70025 – 70034” ISSN: 2169-3536 Volume:6. DOI: 10.1109/ACCESS.2018.2879844 (2018).
Mohammad Ayoub Khan, Mohammed Tabrez Quasim, Norah Saleh Alghamdi, Mohammad Yahiya Khan, A Secure Framework for Authentication and Encryption Using Improved ECC for IoT- Based Medical Sensor Data. “IEEE Access Pages: 52018 – 52027” ISSN: 2169-3536 Volume: 8. DOI: 10.1109/ACCESS.2020.2980739 (2020).
Michael Brengel and Christian Rossow. Identifying Key Leak- Age of Bitcoin Users. International Symposium on Research in Attacks, Intrusions, and Defenses. “Open Access LNSC”, ISBN: 978-3-030-00470-5 volume 11050. DOI: 10.1007/978-3-030-00470-5_29. (2018)
Joachim Breitner and Nadia Heninger Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies, “Lecture Notes in Computer Science Springer International Publishing -Financial Cryptography and Data Security”. DOI: 10.1007/978-3-030-32101-7_1. (2019).
Javed R. Shaikh, Maria Nenova, Georgi Iliev and Zlatka Valkova-Jarvis. Analysis of Standard Elliptic Curves for the Implementation of Elliptic Curve Cryptography in Resource-Constrained E-commerce Applications. “IEEE-COMCAS” ISBN:978-1-5386-3169-0. DOI: 10.1109/COMCAS.2017.8244805. (2017).
Shen Guicheng, Yu Zhen. Application of Elliptic Curve Cryptography in Node Authentication of Internet of Things. “IEEE-IIHMSP” ISBN:978-0-7695-5120-3 DOI: 10.1109/IIH-MSP.2013.118. (2013).
Ravi Kishore Kodali and Ashwitha Naikoti. ECDH-based Security Model for IoT using ESP 8266. “IEEE- ICCICCT” DOI: 10.1109/ICCICCT.2016.7988026 (2016).
Deepak S. Sakkari Mohammed Mujeer ulla. Review on Insight into Elliptic Curve Cryptography. “Modern Approaches in Machine Learning Cognitive Science: A Walkthrough” DOI: 10.1007/978-3-030-96634-88 (2022).
Deepak S. Sakkari Mohammed Mujeer ulla Design and Implementation of Identifying Points on Elliptic Curve Efficiently Using Java. “Modern Approaches in Machine Learning Cognitive Science: A Walkthrough” DOI: 10.1007/978-3-030-96634-88. (2022).
Deepak S. Sakkari Mohammed Mujeer ulla. Design and Implementation of Elliptic Curve Digital Signature Using BitCoin Curves Secp256K1 and Secp384R1 for Base10 and Base16 Using Java. “Innovation in Electrical Power Engineering, Communication, and Computing Technology” DOI: 10.1007/978-981-16-7076-328 (2022).