Side-channel attacks in ECC: A general technique for varying the parametrization of the elliptic curve

被引:0
|
作者
Olson, LD [1 ]
机构
[1] Univ Tromso, Dept Math & Stat, N-9037 Tromso, Norway
关键词
elliptic curves; ECC; cryptography; side-channel attacks; weighted projective curves; uniform addition formula;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks in elliptic curve cryptography occur with the unintentional leakage of information during processing. A critical operation is that of computing nP where n is a positive integer and P is a point on the elliptic curve E. Implementations of the binary algorithm may reveal whether P + Q is computed for P not equal Q or P = Q as the case may be. Several methods of dealing with this problem have been suggested. Here we describe a general technique for producing a large number of different representations of the points on E in characteristic p greater than or equal to 5, all having a uniform implementation of P + Q. The parametrization may be changed for each computation of nP at essentially no cost. It is applicable to all elliptic curves in characteristic p greater than or equal to 5, and thus may be used with all curves included in present and future standards for p greater than or equal to 5.
引用
收藏
页码:220 / 229
页数:10
相关论文
共 50 条
  • [1] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    [J]. INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [2] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao~1
    2.School of Computer Science & Engineering
    3.School of Electronic Engineering
    [J]. Journal of Systems Engineering and Electronics, 2009, 20 (03) : 660 - 665
  • [3] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao
    Fan Mingyu
    Zheng Xiaoyu
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 20 (03) : 660 - 665
  • [4] Chosen Message Side-channel Attacks against Elliptic Curve Cryptosystems
    Xiong Liying
    Wang, Yu
    Li, Huiyun
    [J]. 2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 172 - +
  • [5] A synthesis of side-channel attacks on elliptic curve cryptography in smart-cards
    Danger, Jean-Luc
    Guilley, Sylvain
    Hoogvorst, Philippe
    Murdica, Cedric
    Naccache, David
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (04) : 241 - 265
  • [6] An Efficient Method against Side-Channel Attacks on ECC
    LIU Shuanggen~ 1
    2. College of Computer Information Engineering
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1573 - 1576
  • [7] Architecture for an elliptic curve scalar multiplication resistant to some side-channel attacks
    Yoon, JC
    Jung, SW
    Lee, S
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 139 - 151
  • [8] Machine Learning Analysis for Side-Channel Attacks over Elliptic Curve Cryptography
    Leon Villegas, Felipe Ignacio
    Valencia Cordero, Claudio
    [J]. 2021 IEEE CHILEAN CONFERENCE ON ELECTRICAL, ELECTRONICS ENGINEERING, INFORMATION AND COMMUNICATION TECHNOLOGIES (IEEE CHILECON 2021), 2021, : 266 - 272
  • [9] A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication
    Lu, Chia-Yu
    Jen, Shang-Ming
    Laih, Chi-Sung
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (03) : 428 - 438
  • [10] Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks
    Möller, B
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 402 - 413