期刊文献+

An Efficient Method against Side-Channel Attacks on ECC

An Efficient Method against Side-Channel Attacks on ECC
下载PDF
导出
摘要 Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks (SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than MOEller's one, its cost being about 5% to 10% smaller than MOEller's one. Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks (SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than MOEller's one, its cost being about 5% to 10% smaller than MOEller's one.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1573-1576,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural ScienceFoundation of China (60473029)
关键词 side-channel attacks ECC scalar multiplication algorithm side-channel attacks ECC scalar multiplication algorithm
  • 相关文献

参考文献10

  • 1Certicom.Standards for Efficient Cryptography,SEC 2:Recommended Elliptic Curve Domain Parameters,Version 1.0. http://www.secg.org/download/aid-386/sec2_final.pdf . 2000
  • 2Michael Brown,Darrel Hankerson,Julio Lopez.Software Implementation of the NIST Elliptic Curves Over Prime Fields.[].Progress in Cryptology-CY-RSA.2001
  • 3Coron J.Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems[].CHES’.1999
  • 4Joye,M,Quisquater,J J. Hessian Elliptic Curves and Side-Channel Attacks[C]//Cryptography Hardware and Embedded Systems-CHES’01 (LNCS 2162) . 2001
  • 5Okeya,K,Sakurai,K. A Second-Order DPA Attacks Breaks a Window-Method Based Countermeasure Against Side Channel Attacks[C]//Information Security Conference2002(LNCS 2433) . 2002
  • 6M¨Oller B.Securing Elliptic Curve Point Multiplication Against Side-channel Attacks[].ISC’.2001
  • 7Liardet P V,Smart N.Preventing SPA/DPAin ECC Sys- tems Using the Jacobi Form[].Cryptography Hardware and Embedded Systems-CHES’’.2001
  • 8Joye M,Tymen C.Protections Against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach[].Cryptography Hardware and Embedded Systems- CHES’’.2001
  • 9Lopez J,Dahab R.Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation[].Cryptography Hard- ware and Embedded Systems-CHES’’.1999
  • 10Montgomery P L.Speeding up the Pollard and Elliptic Curve Methods of Factorization[].Mathematics of Computation.1987

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部