
An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for Secure Storage and Routing in TLS/SSL
As the amount of data that is being generated and processed continues to grow in both volume and complexity, data security has become a critical problem. As cloud computing, Internet of Things (IoT) devices, and sophisticated cyber threats continue to grow in popularity, it is necessary to preserve data security through a multidimensional approach that can adapt to the ever-changing risks and technology. Prominent cryptographic algorithms primarily focus on ensuring confidentiality. To address additional parameters, it is necessary to explore algorithms such as signature algorithms for authentication and another algorithm for integrity. Here we introduce the novel approach of securely utilising the Transport Layer Security/Secure Socket Layer (TLS/SSL) protocol with a modified Elliptic Curve Cryptographic (ECC) algorithm which supports the security parameters of confidentiality, authentication and integrity. The main functionalities of establishing the secure connection after the Transmission Control Protocol (TCP) initiation, the handshake process, like cipher suite, authentication and generating a secret key for encryption use the novel modified ECC method with fewer steps when compared to existing TLS/SSL using Rivest Shamir Adleman algorithm (RSA) and other symmetric cryptographic algorithms. The performance is improved by leveraging the computational arithmetic over Elliptic Curve (EC) points for key generation with the Chinese Remainder Theorem (CRT) combined with double and add implementation and the effective hashing algorithm. Additionally, it offers enhanced resistance to Power Analysis Attacks (PAA) and Side Channel Attacks (SCA). Also, it has been demonstrated that the overall performance surpasses the current state of the art in existing solutions.
[1] Ahmadi K., Aghapour S., Kermani M., and Azarderakhsh R., “Efficient Error Detection Cryptographic Architectures Benchmarked on FPGAs for Montgomery Ladder,” IEEE Transactions on Very Large Scale Integration Systems, vol. 32, no. 11, pp. 2154-2158, 2024. DOI:10.1109/TVLSI.2024.3419700
[2] Aljaedi A., Qureshi F., Hazzazi M., Imran M., Bassfar Z., and Jamal S., “FPGA Implementation of Elliptic-Curve Point Multiplication over GF (2233) Using Booth Polynomial Multiplier for Area-Sensitive Applications,” IEEE Access, vol. 12, pp. 72847-72859, 2024. DOI:10.1109/ACCESS.2024.3403771
[3] Al-Khaleel O., Baktir S., and Kupcu A., “Efficient ECC Processor Designs for IoT Using Edwards Curves and Exploiting FPGA Embedded Components,” IEEE Access, vol. 12, pp. 167183- 167200, 2024. DOI:10.1109/ACCESS.2024.3495995
[4] Bag A., Roy D., Patranabis S., and Mukhopadhyay D., “FlexiPair: An Automated Programmable Framework for Pairing Cryptosystems,” IEEE Transactions on Computers, vol. 71, no. 3, pp. 506-519, 2022. DOI:10.1109/TC.2021.3058345
[5] Chen Y., Yin F., Hu S., Sun L., Li Y., and Xing B., “ECC-Based Authenticated Key Agreement Protocol for Industrial Control System,” IEEE Internet of Things Journal, vol. 10, no. 6, pp. 4688-4697, 2023. DOI:10.1109/JIOT.2022.3219233
[6] Cohen H., Frey G., Avanzi R., Doche C., Lange T., Nguyen K., and Vercauteren F., Handbook of Elliptic and Hyperelliptic Curve Cryptography, Chapman and Hall/CRC, 2012. https://sites.cs.ucsb.edu/~koclab/teaching/ccs130 h/2013/EllipticHyperelliptic-CohenFrey.pdf
[7] Dabholkar A. and Yow K., “Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs),” Wireless Personal Communications, vol. 29, pp. 233-246, 2004. https://doi.org/10.1023/B:WIRE.0000047066.741 17.86
[8] Dimitrov V. and Cooklev T., “Two Algorithms for Modular Exponentiation Using Nonstandard Arithmetics,” IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, vol. 78, no. 1, pp. 82-87, 1995. https://globals.ieice.org/en_transactions/fundame ntals/10.1587/e78-a_1_82/_p
[9] Ding C., Pei D., and Salomaa A., Chinese Remainder Theorem: Applications in Computing, Coding, Cryptography, World Scientific, 1996. https://books.google.jo/books?id=RQLtCgAAQB AJ
[10] Gallant R., Lambert R., and Vanstone S., “Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms,” in Proceedings of the Advances in Cryptology Conference, Santa An Efficient Integrity and Authenticated Elliptic Curve Cryptography Algorithm for ... 871 Barbara, pp. 190-200, 2001. https://doi.org/10.1007/3-540-44647-8
[11] Guzey S., Kurt G., and Ozdemir E., “Group Authentication and Key Establishment Scheme,” IEEE Internet of Things Journal, vol. 11, no. 21, pp. 35086-35099, 2024. DOI: 10.1109/JIOT.2024.3436652
[12] Han Y., Guo H., Liu J., Ehui B., Wu Y., and Li S., “An Enhanced Multifactor Authentication and Key Agreement Protocol in Industrial Internet of Things,” IEEE Internet of Things Journal, vol. 11, no. 9, pp. 16243-16254, 2024. DOI:10.1109/JIOT.2024.3355228
[13] Hankerson D., Vanstone S., and Menezes A., Guide to Elliptic Curve Cryptography, Springer, 2006. https://doi.org/10.1007/b97644
[14] Houssain H., Badra M., and Al-Somani T., “Power Analysis Attacks on ECC: A Major Security Threat,” International Journal of Advanced Computer Science and Applications, vol. 3, no. 6, pp. 90-96, 2012. http://dx.doi.org/10.14569/IJACSA.2012.030615
[15] Joye M. and Yen S., “The Montgomery Powering Ladder,” in Proceedings of the Cryptographic Hardware and Embedded Systems Conference, Cologne, pp. 291-302, 2003. https://doi.org/10.1007/3-540-36400-5_22
[16] Kenioua L., Lejdel B., and Nedioui M., “A Comprehensive Approach to Combat GPS Spoofing and Ensure Security Positioning in Autonomous Vehicles,” The International Arab Journal of Information Technology, vol. 21, no. 4, pp. 627-635, 2024. https://doi.org/10.34028/iajit/21/4/7
[17] Kibler M., Galois Fields and Galois Rings Made Easy, Elsevier Ltd, 2017. https://doi.org/10.1016/C2016-0-01243-3
[18] Koblitz N., “Elliptic Curve Cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203-209, 1987. https://www.ams.org/journals/mcom/1987-48- 177/S0025-5718-1987-0866109-5/
[19] Koblitz N., Menezes A., and Vanstone S., “The State of Elliptic Curve Cryptography,” Designs, Codes and Cryptography, vol. 19, pp. 173-193, 2000. https://doi.org/10.1023/A:1008354106356
[20] Kwon D., Son S., Kim M., Lee J., Das A., and Park Y., “A Secure Self-Certified Broadcast Authentication Protocol for Intelligent Transportation Systems in UAV-Assisted Mobile Edge Computing Environments,” IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 11, pp. 19004-19017, 2024. DOI: 10.1109/TITS.2024.3428491
[21] Kwon D., Son S., Park K., Das A., and Park Y., “Design of Blockchain-Based Multi-Domain Authentication Protocol for Secure EV Charging Services in V2G Environments,” IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 12, pp. 21783-21795, 2024. DOI:10.1109/TITS.2024.3472013
[22] Lan X., Xu J., Zhang Z., and Zhu W., “Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3,” IEEE Transactions on Dependable and Secure Computing, vol. 16, no. 2, pp. 272-286, 2019. DOI:10.1109/TDSC.2017.2685382
[23] Li P., Su J., and Wang X., “iTLS: Lightweight Transport-Layer Security Protocol for IoT with Minimal Latency and Perfect Forward Secrecy,” IEEE Internet of Things Journal, vol. 7, no. 8, pp. 6828-6841, 2020. DOI:10.1109/JIOT.2020.2988126
[24] Li X., Niu J., Bhuiyan M., Wu F., Karuppiah M., and Kumari S., “A Robust ECC-Based Provable Secure Authentication Protocol with Privacy Preserving for Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3599-3609, 2018. DOI:10.1109/TII.2017.2773666
[25] Menandas J. and Christo M., “Chinese Remainder Theorem-Based Encoding of Text to Point Elliptic Curve Cryptography,” Journal of Advanced Research in Applied Sciences and Engineering Technology, vol. 47, no. 2, pp. 148-159, 2025. https://doi.org/10.37934/araset.47.2.148159
[26] Miller V., “Use of Elliptic Curves in Cryptography,” in Proceedings of the Theory and Application of Cryptographic Techniques Conference, Santa Barbara, pp. 417-426, 1985. https://doi.org/10.1007/3-540-39799-X_31
[27] Mohamed N., Hashim M., and Hutter M., “Improved Fixed-Base Comb Method for Fast Scalar Multiplication,” in Proceedings of the International Conference on Cryptology in Africa, Morocco, pp. 342-359, 2012. https://doi.org/10.1007/978-3-642-31410-0_21
[28] Oladipupo E., Abikoye O., Imoize A., Awotunde J., Chang T., and Lee C., “An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks,” IEEE Access, vol. 11, pp. 1306-1323, 2023. DOI: 10.1109/ACCESS.2022.3233632
[29] Puckett S., Liu J., Yoo S., and Morris T., “A Secure and Efficient Protocol for LoRa Using Cryptographic Hardware Accelerators,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 22143-22152, 2023. DOI:10.1109/JIOT.2023.3304175
[30] Rabah K., “Theory and Implementations of Elliptic Curve Cryptography,” Journal of Applied Sciences, vol. 5, no. 4, pp. 604-633, 2005. DOI: 10.3923/jas.2005.604.633
[31] Rafique F., Obaidat M., Mahmood K., Ayub M., Ferzund J., and Chaudhry C., “An Efficient and 872 The International Arab Journal of Information Technology, Vol. 22, No. 5, September 2025 Provably Secure Certificateless Protocol for Industrial Internet of Things,” IEEE Transactions on Industrial Informatics, vol. 18, no. 11, pp. 8039-8046, 2022. DOI:10.1109/TII.2022.3156629
[32] Ren S., Liu J., Ji R., Ge S., and Li D., “A Secure Authentication Scheme for Satellite-Terrestrial Networks,” IEEE Transactions on Network Science and Engineering, vol. 11, no. 6, pp. 6470- 6482, 2024. DOI:10.1109/TNSE.2024.3445712
[33] Rivest R., Shamir A., and Adleman L., “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. https://doi.org/10.1145/359340.359342
[34] Saba T., Haseeb K., Rehman A., and Jeon G., “Blockchain-Enabled Intelligent IoT Protocol for High-Performance and Secured Big Financial Data Transaction,” IEEE Transactions on Computational Social Systems, vol. 11, no. 2, pp. 1667-1674, 2024. DOI:10.1109/TCSS.2023.3268592
[35] Saha K., Ray S., and Dasgupta M., “ECMHP: ECC-Based Secure Handshake Protocol for Multicasting in CCN-IoT Environment,” IEEE Transactions on Network and Service Management, vol. 21, no. 5, pp. 5826-5842, 2024. DOI:10.1109/TNSM.2024.3419431
[36] Seo H., Kim H., Park T., Lee Y., Liu Z., and Kim H., “Fixed-Base Comb with Window-Non- Adjacent Form (NAF) Method for Scalar Multiplication,” Sensors, vol. 13, pp. 9483-9512, 2013. DOI:10.3390/s130709483
[37] Shuai M., Xiong L., Wang C., and Yu N., “A Secure Authentication Scheme with Forward Secrecy for Industrial Internet of Things Using Rabin Cryptosystem,” Computer Communications, vol. 160, pp. 215-227, 2020. https://doi.org/10.1016/j.comcom.2020.06.012
[38] Tsaur W. and Chou C., “Efficient Algorithm for Speeding up the Computations of Elliptic Curve Cryptosystem,” Applied Mathematics and Computation, vol. 168, no. 2, pp. 1045-1064, 2005. https://doi.org/10.1016/j.amc.2004.10.010
[39] Viswanathan S. and Kannan A., “Elliptic Key Cryptography with Beta Gamma Functions for Secure Routing in Wireless Sensor Networks,” Journal of Mobile Communication, Computation and Information, vol. 25, pp. 4903-4914, 2019. https://doi.org/10.1007/s11276-019-02073-9
[40] Wang Y., Gamage T., and Hauser C., “Security Implications of Transport Layer Protocols in Power Grid Synchrophasor Data Communication,” IEEE Transactions on Smart Grid, vol. 7, no. 2, pp. 807-816, 2016. DOI:10.1109/TSG.2015.2499766
[41] Wu F., Li X., Xu L., Vijayakumar P., and Kumar N., “A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks with IoT Notion,” IEEE Systems Journal, vol. 15, no. 1, pp. 1120-1129, 2021. DOI:10.1109/JSYST.2020.2981049
[42] Zhang Q., Zhou X., Zhong H., Cui J., Li J., and He D., “Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 7895-7907, 2024. DOI:10.1109/TIFS.2024.3451357
[43] Zhang Y., Li B., Wu J., Liu B., Chen R., and Chang J., “Efficient and Privacy-Preserving Blockchain- Based Multifactor Device Authentication Protocol for Cross-Domain IIoT,” IEEE Internet of Things Journal, vol. 9, no. 22, pp. 22501-22515, 2022. DOI:10.1109/JIOT.2022.3176192