期刊文献+

椭圆曲线中抗SPA和DPA攻击标量乘算法研究 被引量:4

Scalar multiplication algorithm against SPA and DPA attacks in ECC
下载PDF
导出
摘要 标量乘法的效率和安全性是椭圆曲线密码体制的瓶颈问题,针对椭圆曲线上标量乘法的实现方法,对普通抗SPA和DPA攻击的标量乘算法进行了研究,并提出一种改进算法。改进算法引入随机变量,将标量进行编码,采用点的底层域快速算法和滑动窗口算法,达到兼顾效率和安全性的目标。当滑动窗口长度为4,标量的二进制位长分别为160、192和224 bit时,改进算法效率分别提高了26.9%,21.5%和27.2%。 The efficiency and the security of scalar multiplication are the bottleneck problems of elliptic curve cryptosystem.Aimed at the scalar multiplication implementation in ECCt,his paper researches on a scalar multiplication algorithm against the SPA and the DPA attacks,and proposes a new improved algorithm.Random variable is first introduceds,calar is encoded.It adopts a bottom layer fast algorithm and the sliding window algorithm,which takes improvements in efficiency and securi-ty.When sliding window length is 4,scalar quantity binary long for 160,192 and 224 bitst,he improved efficiency of the al-gorithm are 26.9%,21.5% and 27.2%.
作者 童莲 钱江
出处 《计算机工程与应用》 CSCD 北大核心 2010年第35期72-74,共3页 Computer Engineering and Applications
关键词 椭圆曲线密码系统 侧信道攻击 简单能量分析 差分能量分析 标量乘法 滑动窗口算法 Elliptic Curve Cryptosystem(ECC)s ide channel attackss imple power analysis differential power analysiss calar multiplications liding window algorithm
  • 相关文献

参考文献7

  • 1Koblitz N.Elliptic curve crytosystems[J].Mathematics of Computation, 1987,48 : 203-209.
  • 2Miller V.Uses of elliptic curves in cryptography[C]//LNCS 218: Advances in Cryptology-Crypto'85,1986:417-426.
  • 3卢开澄,卢华明.椭圆曲线密码算法引导[M].北京:清华大学出版社,2008:53-55.
  • 4Hadi M,Erfan K M,Behazd K,et al.An efficient algorithm resistant to SPA and DPA variants in ECC[C]//2008 1st IFIP Wireless Days, Dubai, United Arab Emirates, November 24, 2008-November 27,2008.United States:Inst of Elec and Elec Eng Computer Society, 2008.
  • 5殷新春,侯红祥.改进的滑动窗口标量乘算法[J].小型微型计算机系统,2008,29(5):863-866. 被引量:4
  • 6Solinas J A.Efficient arithmetic on koblitz curves[J].Designs, Codes and Cryptogphy,2000, 19(2-3) : 195-249.
  • 7刘文波,张帆,郭云飞,刘力雄.F2^m域椭圆曲线密码系统软件实现的优化技术研究[J].计算机工程与应用,2008,44(19):28-30. 被引量:2

二级参考文献17

  • 1Koblitz N.Elliptic curve cryptosystems[J].Mathematics of Computation, 1987,48 : 203-209.
  • 2Miller V.Uses of elliptic curves in cryptography[C]//LNCS 218: Advances in Cryptology-Crypto'85,1986:417-426.
  • 3Zhu Yue-fei,Zhang Ya-juan.Introduce of ECC system[M].Beijing: Science Publishing Company,2006.
  • 4Cohen H,Miyaji A,Ono T.Efficient elliptic curve exponentiation using mixed coordinates[C]//LNCS 1514..Advances in Cryptology- Crypto'98,1998:51-65.
  • 5Hankerson D, Hernandez J L.Soflware implementation of elliptic cUrve cryptography over binary fields[D/OL].USA:Auburn University. 2006-02.http ://www.dms.auburn.edu/facuhy/hankerson.
  • 6Hankerson D,Menezes A,Vanstone S.Guide to elliptic curve cryptography[M].Berlin : Springer Verlag, 2004.
  • 7Lopez J,Dahab R.Improved algorithms for elliptic curve arithmetic in GF(2n)[C]//LNCS 1556:Selected Areas in Cryptography-SAC'98, 1999:201-212.
  • 8Hankerson D, Lopez Hernandez J, Menezes A. Software implementation of elliptic curve cryptography over binary field[C]. Cryptographic Hardware and Embedded System-CHES 2000, 1965,1-24.
  • 9Fong K,Hankerson D,Lopez Hernandez J,et al. Field inversion and point halving revisited[J]. IEEE Transactions on Computers, 2004,53 (8) : 1047-1059.
  • 10Cohen H, Miyaji A ,Ono T. Efficient elliptic curve exponentiation using mixed coordinates [ C ]. Advances in CryptologyASIACRYPT'98, LNCS, 1998,1514,51-65.

共引文献4

同被引文献26

  • 1刘双根,李萍,胡予濮.椭圆曲线密码中标量乘算法的改进方案[J].计算机工程,2006,32(17):28-29. 被引量:7
  • 2国家商用密码管理办公室.无线局域网产品使用的SMS4密码算法[EB/OL].http//:www.oscca.gov.en/up-File 200621016423197990.pdf,2006.
  • 3MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55.
  • 4HANKERSON D, MENEZES A, VANSTON S. 椭圆曲线密码学导论[M].张焕国,译.北京:电子工业出版社,2005.
  • 5李超,孙兵,李瑞林.分组密码的攻击方法与实例分析[M].北京:科学出版社,2010.
  • 6KOBLITZ N. Elliptic curve crytosystems [J ]. Mathematics ofComputation , 1987(48) : 203-209.
  • 7KOCHERP P C’JAFFE J M,JUN B C.Differential poweranalysis [ C ]. Proceedings of Advances in CRYPTO * 99 , LNCS1666. Springer-Verlag , BerlinHeidelberg, 1999:388-397.
  • 8Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential Power Analysis[C]//Proceedings of the 19th Annual International Cryptology Confer-ence on Advances in Cryptology, 1999.
  • 9KOCHER P C. Timing attacks on implementations of diflfie-hellman, RSA, DSS, and other sys-tems[C]//Berlin: Springer, 1996.
  • 10李浪,李仁发,李静.一种SM4加密算法差分能量攻击[J].北京电子科技学院学报,2008,37(7):39-41.

引证文献4

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部