Side-channel attacks in ECC: A general technique for varying the parametrization of the elliptic curve

被引:0
|
作者
Olson, LD [1 ]
机构
[1] Univ Tromso, Dept Math & Stat, N-9037 Tromso, Norway
关键词
elliptic curves; ECC; cryptography; side-channel attacks; weighted projective curves; uniform addition formula;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks in elliptic curve cryptography occur with the unintentional leakage of information during processing. A critical operation is that of computing nP where n is a positive integer and P is a point on the elliptic curve E. Implementations of the binary algorithm may reveal whether P + Q is computed for P not equal Q or P = Q as the case may be. Several methods of dealing with this problem have been suggested. Here we describe a general technique for producing a large number of different representations of the points on E in characteristic p greater than or equal to 5, all having a uniform implementation of P + Q. The parametrization may be changed for each computation of nP at essentially no cost. It is applicable to all elliptic curves in characteristic p greater than or equal to 5, and thus may be used with all curves included in present and future standards for p greater than or equal to 5.
引用
收藏
页码:220 / 229
页数:10
相关论文
共 50 条
  • [21] Error Detection and Recovery for ECC: A New Approach Against Side-Channel Attacks
    Ma, Kun
    Wu, Kaijie
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (04) : 627 - 637
  • [22] Avoiding Side-Channel Attacks by Computing Isogenous and Isomorphic Elliptic Curves
    Abarzua, Rodrigo
    Martinez, Santi
    Mendoza, Valeria
    Valera, Javier
    [J]. MATHEMATICS IN COMPUTER SCIENCE, 2018, 12 (03) : 295 - 307
  • [23] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [24] Thwarting Side-Channel Attacks
    Edwards, Chris
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 13 - 14
  • [25] Combined Side-Channel Attacks
    Elaabid, M. Abdelaziz
    Meynard, Olivier
    Guilley, Sylvain
    Danger, Jean-Luc
    [J]. INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 175 - 190
  • [26] Algebraic Side-Channel Attacks
    Renauld, Mathieu
    Standaert, Francois-Xavier
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 393 - 410
  • [27] On the Detection of Side-Channel Attacks
    Vateva-Gurova, Tsvetoslava
    Suri, Neeraj
    [J]. 2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 185 - 186
  • [28] Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 155 - 158
  • [29] High Order Side-Channel Security for Elliptic-Curve Implementations
    Belaïd, Sonia
    Rivain, Matthieu
    [J]. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 238 - 276
  • [30] Evolving Side-Channel Resistant Reconfigurable Hardware for Elliptic Curve Cryptography
    Poudel, Bikash
    Louis, Sushil J.
    Munir, Arslan
    [J]. 2017 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2017, : 2428 - 2436