Design of Power Monitoring Security Module for Embedded Device with Elliptic Curve Algorithm


  • Angyoon Jeon
  • Youngho Ko





SPA, Scalar multiplication, Elliptic Curve Discrete Logarithm Problem, sub channel attacks.


Currently, we are pursuing smart home construction, intelligent living environment, environment-friendly residential living and quality of life. However, power monitoring terminals using various wired and wireless networks and protocols in home networks are very vulnerable to security. In this study, we design and develop security system for smart meter terminal which can analyze the cryptographic technology of smart meter, which is vulnerable to physical attack, and exposes personal information from the outside, and maximize the efficiency of terminal.




[1] Diffie W, Hellman ME (1976), “Multiuser cryptographic techniques,†presented at National Computer Conference, New York, and June 7-10, 1976.

[2] Koblitz N (1987), “Elliptic curve cryptosystemsâ€, Math Computer 48, 203–209.

[3] Miller V (1986), “Use of elliptic curves in cryptographyâ€, Advances in Cryptology—CRYPTO ’85, Lecture Notes in Computer Science, 218. Springer, 417–426

View Full Article: