Side-channel attacks in ECC: A general technique for varying the parametrization of the elliptic curve

被引:0
|
作者
Olson, LD [1 ]
机构
[1] Univ Tromso, Dept Math & Stat, N-9037 Tromso, Norway
关键词
elliptic curves; ECC; cryptography; side-channel attacks; weighted projective curves; uniform addition formula;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks in elliptic curve cryptography occur with the unintentional leakage of information during processing. A critical operation is that of computing nP where n is a positive integer and P is a point on the elliptic curve E. Implementations of the binary algorithm may reveal whether P + Q is computed for P not equal Q or P = Q as the case may be. Several methods of dealing with this problem have been suggested. Here we describe a general technique for producing a large number of different representations of the points on E in characteristic p greater than or equal to 5, all having a uniform implementation of P + Q. The parametrization may be changed for each computation of nP at essentially no cost. It is applicable to all elliptic curves in characteristic p greater than or equal to 5, and thus may be used with all curves included in present and future standards for p greater than or equal to 5.
引用
收藏
页码:220 / 229
页数:10
相关论文
共 50 条
  • [31] An Efficient Memory Zeroization Technique Under Side-Channel Attacks
    Srivastava, Ankush
    Ghosh, Prokash
    [J]. 2019 32ND INTERNATIONAL CONFERENCE ON VLSI DESIGN AND 2019 18TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS (VLSID), 2019, : 76 - 81
  • [32] ECC Atomic Block against Strong Side-Channel Attacks using Binary Curves
    Takemura, Yusuke
    Hakuta, Keisuke
    Shinohara, Naoyuki
    [J]. 2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2019), 2019, : 387 - 393
  • [33] Introduction to Side-Channel Attacks and Fault Attacks
    Li, Yang
    Chen, Mengting
    Wang, Jian
    [J]. 2016 ASIA-PACIFIC INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (APEMC), 2016, : 573 - 575
  • [34] A new method for securing elliptic scalar multiplication against side-channel attacks
    Lim, CH
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 289 - 300
  • [35] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [36] Side-Channel Attacks in a Real Scenario
    Tang, Ming
    Luo, Maixing
    Zhou, Junfeng
    Yang, Zhen
    Guo, Zhipeng
    Yan, Fei
    Liu, Liang
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2018, 23 (05) : 586 - 598
  • [37] Codes for Side-Channel Attacks and Protections
    Guilley, Sylvain
    Heuser, Annelie
    Rioul, Olivier
    [J]. CODES, CRYPTOLOGY AND INFORMATION SECURITY, C2SI 2017, 2017, 10194 : 35 - 55
  • [38] DRM to Counter Side-Channel Attacks?
    Benadjila, Ryad
    Billet, Olivier
    Francfort, Stanislas
    [J]. DRM'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON DIGITAL RIGHTS MANAGEMENT, 2007, : 23 - 32
  • [39] Fast elliptic curve multiplications resistant against side channel attacks
    Izu, T
    Takagi, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (01) : 161 - 171
  • [40] Synthesis of Adaptive Side-Channel Attacks
    Quoc-Sang Phan
    Bang, Lucas
    Pasareanu, Corina S.
    Malacaria, Pasquale
    Bultan, Tevfik
    [J]. 2017 IEEE 30TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2017, : 328 - 342