Preventing differential analysis in GLV elliptic curve scalar multiplication

被引:0
|
作者
Ciet, M [1 ]
Quisquater, JJ [1 ]
Sica, F [1 ]
机构
[1] Catholic Univ Louvain, Cyrpto Grp, B-1348 Louvain, Belgium
关键词
public key cryptography; differential power analysis; elliptic curve cryptosystem; fast computation;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on elliptic curves having non-trivial efficiently computable endomorphisms. Cryptographic protocols are sensitive to implementations, indeed as shown in [6,7] information about the secret can be revealed analysing external leakage of the support, typically a smart card. Several software countermeasures have been proposed to protect the secret. However, speed computation is needed for practical use. In this paper, we propose a method to protect scalar multiplication on elliptic curves against Differential Analysis, that benefits from the speed of the Gallant, Lambert and Vanstone method. It can be viewed as a two-dimensional analogue of Coron's method [1] of randomising the exponent k. We propose two variants of this method (one linear and one affine), the second one slightly more effective, whereas the first one offers "two in one", combining point-blinding and exponent randomisation, which have hitherto been dealt separately. For instance, for at most a mere 37.5% (resp. 25%) computation speed loss on elliptic curves over fields with 160 (resp. 240) bits the computation of kP can take on 2(40) different consumption patterns.
引用
收藏
页码:540 / 550
页数:11
相关论文
共 50 条
  • [1] Analysis of Elliptic Curve Scalar Multiplication in Secure Communications
    Thomas, Christina
    Sheela, K. Gnana
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 611 - 615
  • [2] Elliptic Curve Cryptosystems and Scalar Multiplication
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (01): : 27 - 34
  • [3] Scalar multiplication in elliptic curve libraries
    Alimoradi, Reza
    Arkian, Hamid Reza
    Razavian, Seiied-Mohammad-Javad
    Ramzi, Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (03): : 657 - 666
  • [4] Analysis of Multi-Scalar Multiplication in Elliptic Curve Cryptosystem
    Yin, Xinchun
    Zhang, Hailing
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 532 - 535
  • [5] Hard problems in elliptic curve scalar multiplication
    Vijayarangan, Natarajan
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (05): : 445 - 452
  • [6] Elliptic Curve Scalar Multiplication with a Bijective Transform
    Nagai, Yoshitaka
    Shirase, Masaaki
    Izu, Tetsuya
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 280 - 286
  • [7] Parallel scalar multiplication for elliptic curve cryptosystems
    Ansari, B
    Wu, HP
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73
  • [8] Improved elliptic curve scalar multiplication algorithm
    Karthikeyan, E.
    Balasubramaniam, P.
    2006 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2007, : 254 - +
  • [9] Atomicity Improvement for Elliptic Curve Scalar Multiplication
    Giraud, Christophe
    Verneuil, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 80 - +
  • [10] Overview of Scalar Multiplication in Elliptic Curve Cryptography
    Li, Ye
    Feng, Liu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2670 - 2673