Architecture for an elliptic curve scalar multiplication resistant to some side-channel attacks

被引:0
|
作者
Yoon, JC [1 ]
Jung, SW [1 ]
Lee, S [1 ]
机构
[1] Korea Univ, CIST, Seoul, South Korea
关键词
finite field; elliptic curve cryptosystems; side-channel attack; parallel architecture; Montgomery inverse algorithm;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper describes a design of an elliptic curve scalar multiplication and finite field arithmetic. The scalar multiplication design resists to Simple Power Analysis(SPA) and solves performance problem induced by SPA countermeasure. Izu and Takagi[9] proposed a parallel multiplication method resistant against SPA. When it is implemented in parallel with two processors, the computing time for n-bit scalar multiplication is 1.(point doubling) + (n - 1) -(point addition). Although our design uses one multiplier and one inverter for finite field operation, it takes 2n(.)(inversion) to compute n-bit scalar multiplication. If our algorithm utilizes two processors, the computation time is n(point addition) which is almost same as Izu and Takagi's result. The proposed inverter is resistant to Timing Analysis(TA) and Differential Power Analysis(DPA). Lopez and Dahab[13] argued that for GF(2(n)), projective coordinates perform better than the affine coordinates do when inversion operation is more than 7 times slower than the multiplication operation. Speed ratio of the proposed inverter to the proposed multiplier is 6. Thus, the proposed architecture is efficient on the affine coordinates.
引用
收藏
页码:139 / 151
页数:13
相关论文
共 50 条
  • [1] Faster Side-Channel Resistant Elliptic Curve Scalar Multiplication
    Venelli, Alexandre
    Dassance, Francois
    [J]. ARITHMETIC, GEOMETRY, CRYPTOGRAPHY AND CODING THEORY 2009, 2010, 521 : 29 - +
  • [2] A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication
    Lu, Chia-Yu
    Jen, Shang-Ming
    Laih, Chi-Sung
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (03) : 428 - 438
  • [3] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    [J]. INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [4] Flexible parallel computing for elliptic curve scalar multiplication with resistance against simple side-channel attacks
    [J]. Wu, Keke (wukk@sziit.edu.cn), 1600, Computer Society of the Republic of China (28):
  • [5] A new method for securing elliptic scalar multiplication against side-channel attacks
    Lim, CH
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 289 - 300
  • [6] Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks
    Möller, B
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 402 - 413
  • [7] Improved elliptic curve multiplication methods resistant against side channel attacks
    Izu, T
    Möller, B
    Takagi, T
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 296 - 313
  • [8] Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors
    Dubeuf, Jeremy
    Hely, David
    Beroulle, Vincent
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 65 - 82
  • [9] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao~1
    2.School of Computer Science & Engineering
    3.School of Electronic Engineering
    [J]. Journal of Systems Engineering and Electronics, 2009, 20 (03) : 660 - 665
  • [10] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao
    Fan Mingyu
    Zheng Xiaoyu
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 20 (03) : 660 - 665