Side-channel attacks in ECC: A general technique for varying the parametrization of the elliptic curve

被引:0
|
作者
Olson, LD [1 ]
机构
[1] Univ Tromso, Dept Math & Stat, N-9037 Tromso, Norway
关键词
elliptic curves; ECC; cryptography; side-channel attacks; weighted projective curves; uniform addition formula;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Side-channel attacks in elliptic curve cryptography occur with the unintentional leakage of information during processing. A critical operation is that of computing nP where n is a positive integer and P is a point on the elliptic curve E. Implementations of the binary algorithm may reveal whether P + Q is computed for P not equal Q or P = Q as the case may be. Several methods of dealing with this problem have been suggested. Here we describe a general technique for producing a large number of different representations of the points on E in characteristic p greater than or equal to 5, all having a uniform implementation of P + Q. The parametrization may be changed for each computation of nP at essentially no cost. It is applicable to all elliptic curves in characteristic p greater than or equal to 5, and thus may be used with all curves included in present and future standards for p greater than or equal to 5.
引用
收藏
页码:220 / 229
页数:10
相关论文
共 50 条
  • [41] Side-Channel Attacks in a Real Scenario
    Ming Tang
    Maixing Luo
    Junfeng Zhou
    Zhen Yang
    Zhipeng Guo
    Fei Yan
    Liang Liu
    [J]. Tsinghua Science and Technology, 2018, 23 (05) : 586 - 598
  • [42] Side-Channel Attacks on Cryptographic Software
    Lawson, Nate
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (06) : 65 - 68
  • [43] Optimal Collision Side-Channel Attacks
    Glowacz, Cezary
    Grosso, Vincent
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, CARDIS 2019, 2020, 11833 : 126 - 140
  • [44] A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks
    Poussier, Romain
    Zhou, Yuanyuan
    Standaert, Francois-Xavier
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 : 534 - 554
  • [45] Side-Channel Attacks: A Short Tour
    Piessens, Frank
    van Oorschot, Paul C.
    Piessens, Frank
    van Oorshot, Paul C.
    [J]. IEEE SECURITY & PRIVACY, 2024, 22 (02) : 75 - 80
  • [46] Soft Analytical Side-Channel Attacks
    Veyrat-Charvillon, Nicolas
    Gerard, Benoit
    Standaert, Francois-Xavier
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 282 - 296
  • [47] Cache Side-Channel Attacks and Defenses
    Zhang, Weijuan
    Bai, Lu
    Ling, Yuqing
    Lan, Xiao
    Jia, Xiaoqi
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 206 - 222
  • [48] Multi-class SVMs Analysis of Side-Channel Information of Elliptic Curve Cryptosystem
    Saeedi, Ehsan
    Hossain, Md. Selim
    Kong, Yinan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2015,
  • [49] Improved elliptic curve multiplication methods resistant against side channel attacks
    Izu, T
    Möller, B
    Takagi, T
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 296 - 313
  • [50] Countermeasure of ECC against Side-channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    [J]. 2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 465 - 469