Faster Side-Channel Resistant Elliptic Curve Scalar Multiplication

被引:0
|
作者
Venelli, Alexandre [1 ]
Dassance, Francois [2 ]
机构
[1] Univ Mediterranee, IML ERISCS, Case 907,163 Ave Luminy, F-13288 Marseille 09, France
[2] Cornell Univ, Ithaca, NY 14853 USA
关键词
FAULT ATTACKS;
D O I
暂无
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
We present a new point scalar multiplication algorithm on classical Weierstrass elliptic curves over fields of characteristic greater than 3. Using Meloni's formula that efficiently adds two points with the same Z-coordinates, we develop an algorithm computing [k]P only with these point additions. We combine Meloni's addition with a modified version of a Montgomery ladder, a well-established side-channel resistant method for scalar multiplication. Our aim is to construct an algorithm that is resistant, by construction, against Simple Power Analysis (SPA) and Fault Analysis (FA) while still being efficient. We present four versions of our algorithm with various speed-ups depending on the available memory of the device. Finally, we compare our method with state-of-the-art algorithms at the same level of side-channel resistance.
引用
收藏
页码:29 / +
页数:3
相关论文
共 50 条
  • [31] Overview of Scalar Multiplication in Elliptic Curve Cryptography
    Li, Ye
    Feng, Liu
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2670 - 2673
  • [32] Key Bit-Dependent Side-Channel Attacks on Protected Binary Scalar Multiplication
    Sim, Bo-Yeon
    Kang, Junki
    Han, Dong-Guk
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (11):
  • [33] Elliptic Curve Scalar Multiplication Algorithm Based on Side Channel Atomic Block over GF(2m)
    Liu, Shuang Gen
    Hu, Yan Yan
    Wei, Lan
    [J]. International Journal of Network Security, 2021, 23 (06) : 1005 - 1011
  • [34] A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards
    Danger, Jean-Luc
    Guilley, Sylvain
    Hoogvorst, Philippe
    Murdica, Cedric
    Naccache, David
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (04) : 241 - 265
  • [35] Parallel crypto-devices for GF(p) elliptic curve multiplication resistant against side channel attacks
    Ghosh, Santosh
    Alam, Monjur
    Chowdhury, Dipanwita Roy
    Sen Gupta, Indranil
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (02) : 329 - 338
  • [36] Machine Learning Analysis for Side-Channel Attacks over Elliptic Curve Cryptography
    Leon Villegas, Felipe Ignacio
    Valencia Cordero, Claudio
    [J]. 2021 IEEE CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (IEEE CHILECON 2021), 2021, : 266 - 272
  • [37] Side-channel attacks in ECC: A general technique for varying the parametrization of the elliptic curve
    Olson, LD
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 220 - 229
  • [38] Side Channel Attack Resistant Architecture for Elliptic Curve Cryptography
    Zode, Pravin
    Deshmukh, Raghavendra B.
    [J]. 2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [39] SPA Resistant Scalar Multiplication Based on Addition and Tripling Indistinguishable on Elliptic Curve Cryptosystem
    Liu, Shuanggen
    Yao, Huatong
    Wang, Xu An
    [J]. 2015 10TH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2015, : 785 - 790
  • [40] Stronger and Faster Side-Channel Protections for CSIDH
    Cervantes-Vazquez, Daniel
    Chenu, Mathilde
    Chi-Dominguez, Jesus-Javier
    De Feo, Luca
    Rodriguez-Henriquez, Francisco
    Smith, Benjamin
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2019, 2019, 11774 : 173 - 193