Intelligent Transportation Systems (ITS) relate to systems in which information and communication technologies are applied in the field of road transport, including infrastructure, vehicles and users, and in traffic management and mobility management. One feature of ITS is the Vehicle-Originating Broadcast (VOB). The originating vehicle broadcasts information about its movements and safety-related attributes frequently to make sure that this information is available to other vehicles so that each receiving vehicle can identify potentially hazardous situations arising from the behavior of the transmitting vehicle.
This typically involves transmission of Basic Safety Messages which need to include the following security requirements: authenticity, integrity, authorization and privilege classes, non-repudiation of origin and anti-replay related to having a message signature. ITS security standards as disclosed in ETSI TS 102 687 v 1.1.1 incorporated herein by reference, along with “Status of ITS Security Standards”, Document HTG1-1, US Department of Transportation/European Commission, Version 2012-11-12, in their entirety specify the minimum interval between Basic Safety Messages as 40 ms. Any VOB system that satisfies the standard needs to be able to send a Basic Safety Message every 40 ms. However, as noted above, each Basic Safety Message requires a message signature to satisfy security requirements which means the Basic Safety Message needs to be signed. Given that the minimum message interval is 40 ms, the total time budget available to generate a complete digital signature is 40 ms. However, from an application point of view, it is typically not acceptable to impose a latency of up to 40 ms for generation of a digital signature, especially for Basic Safety Messages. This typically requires that the signature generation latency be below about 10 ms. Note that signature generation (signing the message) needs to be performed in a secure environment such as that offered by a secure element or more precisely by the secure element's software crypto library and the cryptographic coprocessor whereas signature verification does not need to be performed in the secure environment. The secure environment represented by, for example, the crypto library of the cryptographic coprocessor, typically possesses less powerful hardware than the less secure environment hardware.
a shows steps for calculating an ECDSA signature in the prior art.
b shows the time budget for calculating the signature in
a shows pre-computing a portion of the ECDSA signature before inputting the message hash in the prior art.
b shows the time budget for the computations in
a-b shows an embodiment in accordance with the invention.
c shows the time budget for the computation in
a-b shows an embodiment in accordance with the invention.
c shows the time budget for the computation in
The signature scheme selected for Basic Safety Messages in ITS is the Elliptic Curve Digital Signature Algorithm (ECDSA). ECDSA requires designation of the elliptic curve E defined over a finite field Fq and elliptic curve base point G ∈ E (Fq) to be used as a generator of the elliptic curve subgroup with a large prime order n, where n, an integer, is the order of G which means that n*G=O (where O is the identity element and * denotes elliptic curve point multiplication by a scalar).
a shows the typical steps of the ECDSA signature generation function for generating the pair (r, s) which is the digital message signature. In step 101, e, the HASH (cryptographic hash function) of the message m (e.g. safety message) is input. The cryptographic hash function, HASH, may be the Secure Hash Algorithm-2 (SHA-2) provided by the NSA or other suitable cryptographic hash functions. In step 102, a random integer k between 0 and n is selected. In step 103, the curve point (x, y)=k*G is computed. In step 104, r=x mod n is computed where mod is short for the modulus operation. In step 105, s=k−1*(e+d*r) mod n is computed where d is the private key integer. Finally, in step 106, the digital message signature (r, s) is returned.
b shows time budget 150 for the ECDSA signature generation function. At t=0, after the message m has been received, the message hash e is input into the ECDSA signature generation function which requires i milliseconds to compute the message signature leaving (j−i) milliseconds “slack” time. Here, j is minimum interval between Basic Safety Messages, for example, or data packets in other applications requiring ECDSA signature generation.
A typical approach to reducing latency of the ECDSA signature generation function is to pre-compute quantities in the ECDSA signature generation function that do not depend on the cryptographic hash function of the message, HASH(m) such as r and k−1.
b shows time budget 250 for the ECDSA signature generation function. At t=0, signature generation function initiates pre-computation of steps 201, 202, 203 and 204 which requires a milliseconds to compute. e=HASH(m) is input in step 205 when e becomes available. Note this may be some time after the pre-computations have been completed. Step 206 completing the ECDSA digital signature is then performed and the completed digital message signature is output in step 207 after h milliseconds leaving (j−h) milliseconds “slack” time. Here, j is minimum interval between Basic Safety Messages, for example, or data packets in other applications requiring low latency m
A typical problem with the approach shown in
In an embodiment in accordance with the invention, the pre-computation involves generating a complete ECDSA signature s ‘but using a dummy hash e’ as input to the computation, as shown in
The actual s=s′+k−1 (e−e′) mod n for the message m still needs to be computed. This requires determination of k−1 which can be derived from s′=k−1*α mod n=k−*(e′+d*r) mod n if α−1=(e′+d*r)−1 mod n is known. Then k−1=s′*α−1 mod n can be computed.
An embodiment in accordance with the invention is shown in
c shows time budget 350 for the ECDSA signature generation function for an embodiment in accordance with the invention. At t=0, the message dummy hash e′ is input into the ECDSA signature generation function which requires i milliseconds to compute the message signature s′ for dummy hash e′, leaving (j−i) milliseconds time leftover for the pre-computation of α−1 and k−1 insteps 307-308, input of e=HASH(m) in step 309, computation of s in step 310 and the output of s in step 311. Here, j is minimum interval between Basic Safety Messages, for example, or data packets in other applications requiring low latency ECDSA signature generation.
The embodiment in accordance with the invention shown in
In an embodiment in accordance with the invention, the pre-computation involves generating a complete ECDSA signature but for e=0 as shown in
The actual s=s′+(k−1*e) mod n for the message m still needs to be computed. This requires determination of k−1 which can be derived from s′=(k−1*d*r) mod n if both d−1 and r−1 are known. Then k−1=(s′*d−1*r−1) mod n. r−1 needs to be computed for every digital message signature as a new selection of k is required for each digital message signature. The value d−1 can be pre-computed for multiple signatures: for each private key integer d, d−1=ModInv (d, n) needs to be computed only once, where ModInv is the modular inversion operation in Zn (=integers 0, 1, . . . , n−1). The modular inverse may be computed in the cryptographic coprocessor if the interface between the secure microprocessor and the cryptographic coprocessor allows direct access by user software running on the secure microprocessor to the ModInv function on the cryptographic coprocessor. As long as the same private key integer d is used for the digital signature, the result of d−1 can therefore effectively be regarded as a constant for the purposes of this discussion.
In an embodiment in accordance with the invention shown in
c shows time budget 450 for the ECDSA signature generation function for an embodiment in accordance with the invention. At t=0, the message hash e=0 is input into the ECDSA signature generation function which requires i milliseconds to compute the message signature s′ for e=0, leaving (j−i) milliseconds time leftover for the pre-computation of r−1 and k−1 steps 407-408, input of e=HASH(m) in step 409, computation of s in step 410 and the output of s in step 411. Here, j is minimum interval between Basic Safety Messages, for example, or data packets in other applications requiring low latency ECDSA signature generation.
Secure microprocessor 510 is electrically coupled to cryptographic coprocessor 520 and together execute a software crypto library 515 for generating an elliptical curve digital signature. Optionally, firmware 525 may be present on cryptographic coprocessor 520 and used to control coprocessor 520. Secure microprocessor is electrically coupled to memory 530 which may include a secure memory. Finally, secure microprocessor 510 is electrically coupled to input/out (I/O) 540 which is configured to output the elliptical curve digital signature as part of a transmitted message or data packet. For example, in an ITS type system, the embodiment in