banner

Design and implementation of secured file delivery protocol using enhanced elliptic curve cryptography for class I and class II transactions

Smitha Sasi, Srividya Bharadwaj Venkata Subbu, Premkumar Manoharan, Laith Abualigah

Abstract


This research study introduces an ID-based identity authentication protocol that utilizes the enhanced elliptic curve digital signature algorithm, a cryptographic method developed on elliptic curve cryptography. The protocol enhances the Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), a pioneering protocol explicitly defined for distant space communications. This study employs both dependable and uncertain modes of the CFDP protocol. To make more secure data transactions, two key security risks are effectively mitigated in this research as a result of applying the proposed enhanced elliptic curve cryptography algorithm (ECC) over the ternary galois field. First, it thwarts the impersonation of a harmful entity during a passive attack. Second, it prevents masquerade attacks, further reinforcing the security of space data transmission. This ID-based authentication protocol, therefore, offers a significant advancement in protecting far-space communications, optimizing the integrity of data exchanged across vast distances.

Keywords


authentication protocol; consultative committee for space data systems; CCSDS file delivery protocol; elliptic curve cryptography

Full Text:

PDF

References


1. Chauhan SS, Jain N, Pandey SC. Digital signature with message security process. In: Proceedings of the 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE); 28–29 April 2022; Greater Noida, India. pp. 182–187.

2. Genç Y, Afacan E. Design and implementation of an efficient elliptic curve digital signature algorithm (ECDSA). In: Proceedings of the 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS); 21–24 April 2021; Toronto, Canada. pp. 1–6.

3. Mehibel N, Hamadouche M. A new enhancement of elliptic curve digital signature algorithm. Journal of Discrete Mathematical Sciences and Cryptography 2020; 23(3): 743–757. doi: 10.1080/09720529.2019.1615673

4. Federal Information Processing Standard publication #180-1. Secure Hash Standard. National Institute of Standards and Technology; 1995. p. 310.

5. Federal Information Processing Standards publication #186-2. Digital Signature Standard (DSS). National Institute of Standards and Technology; 2000. pp. 309–312.

6. Recommendations Regarding Federal Information Processing Standard (FIPS) #186-2. Digital Signature Standard (DSS). National Institute of Standards and Technology; 2001. p. 311.

7. Chen L, Moody D, Regenscheid A, Randall K. Recommendations for Discrete Logarithm-Based Cryptography: Elliptic Curve Domain Parameters. National Institute of Standards and Technology; 2019.

8. Brickell E, Pointcheval D, Vaudenay S, Yung M. Design validations for discrete logarithmbased signature schemes. In: Imai H, Zheng Y (editors). Public Key Cryptography. PKC 2000. Lecture Notes in Computer Science. Springer; 2000. Volume 1751. pp. 276–292.

9. Brown DRL. The exact security of ECDSA. Available online: https://cacr.uwaterloo.ca/techreports/2000/corr2000-54.ps (accessed on 30 August 2023).

10. Kim SR, Kyung R. Study on modified public key cryptosystem based on elgamal and cramer-shoup cryptosystems. In: Proceedings of the 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC); 2023; 8–11 March 2023; Las Vegas, NV, USA. pp. 0280–0284.

11. Zhou R, Lin Z. An improved exponential elgamal encryption scheme with additive homomorphism. In: Proceedings of the 2022 International Conference on Blockchain Technology and Information Security (ICBCTIS); 15–17 July 2022; Huaihua, China. pp. 25–27.

12. ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakley GR, Chaum D (editors). Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science. Springer; 2000. Volume 196. pp. 469–472.

13. Koblitz N. CM-Curves with good cryptographic properties. In: Feigenbaum J (editor). Advances in Cryptology—CRYPTO’91. CRYPTO 1991. Lecture Notes in Computer Science. Springer; 2001. Volume 576. pp. 279–287.

14. Silverman JH. An introduction to thetheory of elliptic curves. Available online: https://www.math.brown.edu/~jhs/Presentations/WyomingEllipticCurve.pdf (accessed on 21 July 2023).

15. Huang J, Jiao J, Wang Y, et al. Age-critical long erasure coding-CCSDS file delivery protocol for dual-hop S-IoT. IEEE Internet of Things Journal 2023. doi: 10.1109/JIOT.2023.3274519

16. Clarke NL, Katos V, Menesidou SA et al. A Novel Security Architecture for a Space-Data DTN. In: Koucheryavy Y, Mamatas L, Matta I, et al. (editors). Wired/Wireless Internet Communication. WWIC 2012. Lecture Notes in Computer Science, Springer; 2012. Volume 7277. pp. 31–45.

17. Liu Z, Liu R, Zhang H, et al. Parallel implementation of the CCSDS turbo decoder on GPU. In: China Communications (Early Access). IEEE; 2023. pp. 1–8.

18. Gupta K, Silakari S. Performance analysis for image encryption using ECC. In: Proceedings of the 2010 International Conference on Computational Intelligence and Communication Networks; 26–28 November 2010; Bhopal, India. pp. 79–82.

19. Aswatha AR, Sasi S, Santhosh B, et al. Design and implementation of unreliable CFDP protocol over elliptic curve cryptography. In: Satapathy S, Bhateja V, Mohanty J, et al. (editors). Smart Intelligent Computing and Applications, Smart Innovation, Systems and Technologies. Springer; 2019. Volume 160. pp. 627–638.

20. Khan NA, Awang A. Elliptic curve cryptography for the security of insecure internet of things. In: Proceedings of the 2022 International Conference on Future Trends in Smart Communities (ICFTSC); 1–2 December 2022; Kuching, Sarawak, Malaysia. pp. 59–64.

21. Fang X, Wu Y. Investigation into the elliptic curve cryptography. In: Proceedings of the 2017 3rd International Conference on Information Management (ICIM); 21–23 April 2017; Chengdu, China. pp. 412–415.

22. Ali Z, Ghani A, Khan I, et al. A robust authentication and access control protocol for securing wireless healthcare sensor networks. Journal of Information Security and Applications 2020; 52: 102502. doi: 10.1016/j.jisa.2020.102502

23. Pushpa SX, Raja KS. Enhanced ECC based authentication protocol in wireless sensor network with DoS mitigation. Cybernetics and Systems 2022; 53(8): 734–755. doi: 10.1080/01969722.2022.2055403

24. Srividya BV, Akhila S. Implementing a hybrid crypto-coding algorithm for an image on FPGA. In: Satapathy S, Joshi A (editors). Information and Communication Technology for Intelligent Systems (ICTIS 2017)-Volume 2. Springer; 2017. pp. 72–84.

25. Mahto D, Yadav DK. RSA and ECC: A comparative analysis. International Journal of Applied Engineering Research 2017; 12(19): 9053–9061.




DOI: https://doi.org/10.32629/jai.v6i3.740

Refbacks

  • There are currently no refbacks.


Copyright (c) 2023 Smitha Sasi, Srividya Bharadwaj Venkata Subbu, Premkumar Manoharan, Laith Abualigah

License URL: https://creativecommons.org/licenses/by-nc/4.0