Despite the fact that ECDSA is the most innovative asymmetric digital signature technique, experts are working tirelessly to strengthen it to survive various challenges. Both internal and external attacks can occur from intruders. An end-user, a malware-infected IT component, a physical attacker who operates within the environment's security perimeter, or a physical person who directly interacts with the environment, manages the hardware, or even communicates with the end-user (i.e., a malicious signer). In contrast, an external attack involves the attacker moving outside the signature environment's security boundary, possibly across a network. Attacks on interfaces place more emphasis on the protocols that a device employs to interact with the outside world rather than on the machine itself. The proposed work presents a solution to an improved, lightweight ECDSA which is resistant to MITM, Replay and forgery attacks than its counterparts. The comparison of the proposed ECDSA is compared with its counterpart and cryptanalysis is performed to prove that the proposed ECDSA is more relevant in real time since the Zhong's Method takes 13.28% less time to sign data than the Suggested ECDSA method. The Suggested technique stands out in broader application areas where calculation time is a concern since it requires 8.2% less time than Zhong's Method for Signature verification at the Receiver end.
Objectives: To build a bridge to provide a solution by developing a lightweight ECDSA method that is not only lower in computational aspect but also is more secure than the Zhong's ECDSA. Methods: The proposed research work performs cryptanalysis of Zhong's ECDSA and demonstrates that the method fails to withstand MITM attacks. The proposed ECDSA uses only 1 elliptic curve point multiplication ECPM operation, 1 Modular multiplication operation and zero Modular Inverse operations making it lightweight in terms of computational time. Zero inverse operations save computational time as the process involves scalar mathematics which is time-consuming. Findings: Zhong's ECDSA is not secure. Additionally, the technique takes 13.28% less time to sign data than the suggested ECDSA method. Through proofs, it is shown by comparison of the proposed ECDSA and Zhong's ECDSA and cryptanalysis that the proposed ECDSA is more applicable in real time. Although Zhong's Method for Signature verification at the Receiver end takes 8.2% more time, the recommended technique stands out in comparison to Zhong's ECDSA w.r.t security. Novelty: The work is a detailed expression of the provablysecure attack-resistant light-weight digital signature based on elliptical curve for resource constrained applications. Advancing, the novelty of the work lies in the comparison of the two techniques w.r.t their performance parameters like number of keys generated, time taken to generate keys, number of keys verified, time taken for key verification, time taken for Signature generation and time taken for Signature verification.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.