Kamalakannan Venkataraman, Tamilselvan Sadasivam

DOI Number
First page
Last page


With rapid deployment of Internet-of-Things (IoT) devices, security issues related to data transmitted between the devices increases. Thus the integrity of perceptual layer devices is of utmost importance to secure the information being transmitted between the devices. In a secured information system, digital signature generation and verification processes are entirely different from data encryption and decryption processes. Digital signatures are rapidly emerging due to the problems related to data integrity thus playing a crucial role in the authentication process by enabling the sender to attach a signature to the encrypted message. Based on the devices it is beneficial to select an  algorithm showing favorable behavior, therefore Keccak-f [1600] algorithm is best suited for devices having area and cost constraints. In this paper, implementation of the original Elliptic Curve Digital Signature Algorithm and its variants are considered and evaluated in terms of the security level and computational cost. Here the modified ECDSA scheme concepts related to signature generation and verification are similar to the original ECDSA scheme. The computational cost of the Modified ECDSA is reduced by removing inverse operation in key generation and signing phase, also problems related to signature being forged are resolved using hidden generator point concept. Hence the Modified ECDSA is more secure with less computational cost when implemented on FPGA using Verilog HDL. Therefore, this algorithm can be applied for the devices being connected in perceptual layer of the IoT.


Internet of Things, Elliptic Curve Cryptography, Elliptic Curve Digital Signature Algorithm, Secured Hash Algorithm, Keccak

Full Text:



N. Koblitz, A. J. Menezes, and S. A. Vanstone, “The state of elliptic curve cryptography”, Design, Codes, and Cryptography, vol. 19, Issue 2-3, pp.173-193, 2000.

V. Miller, “Use of elliptic curves in cryptography”, Advances in Cryptography-Crypto ’85. LNCS 218, Springer Verlag, 1986, pp. 417-426.

G. Provelengios, P. Kitsos, N. Sklavos, and C. Koulamas, “FPGA-Based Design Approaches of Keccak Hash Function,” In Proceedings of the 15th Euromicro Conference, 2012, pp. 648-653.

D. Manel, O. Raouf, H. Ramzi and A. Mtibaa, “Hash Function and Digital Signature based on Elliptic Curve”, In Proceedings of the 14th international conference on Sciences and Techniques of Automatic control & computer engineering - STA'2013, Sousse, Tunisia, December 20-22, 2013 pp. 388-392.

K. Latif, M. M. Rao, A. Aziz, and A. Mahboob, “Efficient Hardware Implementations and Hardware Performance Evaluation of SHA-3 Finalists,” In Proceeding of 3rd SHA-3 Candidate Conference, March 2012.

S. P. Raj, A. P. Renold, “An Enhanced Elliptic Curve Algorithm for Secured Data Transmission in Wireless Sensor Network”, In Proceedings of Global Conference on Communication Technologies (GCCT 2015), pp. 891-896.

A. Khalique, K. Singh, S. Sood, “Implementation of Elliptic Curve Digital Signature Algorithm”, International Journal of Computer Applications, vol. 2, no. 2, pp. 21-27, May 2010.

E. Wajih, B. Noura, M. Mohsen & T. Rached, “Low Power Elliptic Curve Digital Signature Design for Constrained Devices”, International Journal of Security (IJS), vol. 6, no.2, pp. 1-14, April 2012.

G. Sarath, D. C. Jinwala and S. Patel, “A Survey on Elliptic Curve Digital Signature Algorithm and its Variants”, Computer Science & Information Technology (CS & IT) –CSCP, 2014, pp. 121–136.

A. I. Ali, H. P. Isitc, “Comparison and Evaluation of Digital Signature Schemes Employed in NDN Network”, International Journal of Embedded systems and Applications (IJESA), vol. 5, no. 2, pp. 15-29, June 2015,

H. Junru, “The improved elliptic curve digital signature algorithm”, In Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011, pp. 257-259.

B. Panjwani, D. C. Mehta, “Hardware-Software Co-design of Elliptic Curve Digital Signature Algorithm over Binary Fields”, In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015, pp. 1101-1106.

X. Zhang, S. Ma, W. Shi, and D. Han, “Implementation of Elliptic Curve Digital Signature Algorithm on IRIS Nodes”, In Proceedings of the International Conference on Estimation, Detection and Information Fusion (ICEDIF 2015), pp. 403-406.


  • There are currently no refbacks.

ISSN: 0353-3670