Some ways to secure elliptic curve cryptosystems

被引:13
作者
Hedabou, Mustapha [1 ]
Beneteau, Lucien [1 ]
Pinel, Pierre [1 ]
机构
[1] INSA Toulouse, LESIA, F-31077 Toulouse 4, France
关键词
elliptic curve cryptography; comb method; side channel attacks; scalar multiplication; pre-computed table; memory space;
D O I
10.1007/s00006-008-0093-8
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Side Channel Attacks have become a serious threat for cryptographic applications oil devices with small resources. Indeed, it turns out that the usual randomization techniques cannot, prevent; the recent DPA attacks (RPA and ZPA). The implementation of elliptic curve cryptosystems (ECC) on such devices must, combine all optimized use of space memory with a high level of security and efficiency. In this paper we present all efficient SCA-resistant algorithm based on the fixed-base comb method. We propose to modify the binary representation of the secret scalar in order to obtain a new sequence of non-zero bit-strings. This, combined with the use of Randomized Linearly-transformed coordinates (RLC), will prevent the SCA attacks on the comb method, including RPA and ZPA. Furthermore, our algorithm optimizes the size of the precornputed table; we only store 2(w-1) points instead of 2(w-1) for the fixed-base comb method, without affecting in any way the computation time. We also present a parallel architecture implementation of the proposed algorithm including the countermeasures for preventing the recent attacks RPA and ZPA.
引用
收藏
页码:677 / 688
页数:12
相关论文
共 17 条
[1]  
Akishita T, 2003, LECT NOTES COMPUT SC, V2851, P218
[2]  
Brown M, 2001, LECT NOTES COMPUT SC, V2020, P250
[3]  
Chae Hoon Lim, 1994, Advances in Cryptology - CRYPTO '94. 14th Annual International Cryptology Conference. Proceedings, P95
[4]  
Cohen H, 1998, LECT NOTES COMPUT SC, V1514, P51
[5]  
Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292
[6]   Power attacks on a side-channel resistant elliptic curve implementation [J].
Geiselmann, W ;
Steinwandt, R .
INFORMATION PROCESSING LETTERS, 2004, 91 (01) :29-32
[7]  
Goubin L, 2003, LECT NOTES COMPUT SC, V2567, P199
[8]  
ITOH K, 2004, P CARDIS WCC
[9]  
Joye M., 2001, LNCS, V2162, P386
[10]  
Joye M., 2001, LNCS, V2162, P412