Low-cost solutions for preventing simple side-channel analysis: Side-channel atomicity

被引:146
作者
Chevallier-Mames, B [1 ]
Ciet, M
Joye, M
机构
[1] Gemplus, Card Secur Grp, La Ciotat, France
[2] Catholic Univ Louvain, UCL Crypto Grp, Louvain, Belgium
关键词
cryptographic algorithms; side-channel analysis; protected implementations; atomicity; exponentiation; elliptic curves;
D O I
10.1109/TC.2004.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces simple methods to convert a cryptographic algorithm into an algorithm protected against simple side-channel attacks. Contrary to previously known solutions, the proposed techniques are not at the expense of the execution time. Moreover, they are generic and apply to virtually any algorithm. In particular, we present several novel exponentiation algorithms, namely, a protected square-and-multiply algorithm, its right-to-left counterpart, and several protected sliding-window algorithms. We also illustrate our methodology applied to point multiplication on elliptic curves. All these algorithms share the common feature that the complexity is globally unchanged compared to the corresponding unprotected implementations.
引用
收藏
页码:760 / 768
页数:9
相关论文
共 17 条
[1]  
[Anonymous], LNCS
[2]  
Blake I.F., 1999, ELLIPTIC CURVES CRYP
[3]  
Boneh Dan, 1997, LECT NOTES COMPUTER, V1233, P37, DOI DOI 10.1007/3-540-69053-0_
[4]  
CHEVALLIERMAMES B, 2002, Patent No. 2838210
[5]  
Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292
[6]  
GOLDREICH O, 2002, FDN CRYPTOGRAPHY BA
[7]   A survey of fast exponentiation methods [J].
Gordon, DM .
JOURNAL OF ALGORITHMS-COGNITION INFORMATICS AND LOGIC, 1998, 27 (01) :129-146
[8]   FAST SQUARE-AND-MULTIPLY EXPONENTIATION FOR RSA [J].
HUI, LCK ;
LAM, KY .
ELECTRONICS LETTERS, 1994, 30 (17) :1396-1397
[9]  
IEEE, 2000, 13632000 IEEE COMP S
[10]   Recovering lost efficiency of exponentiation algorithms on smart cards [J].
Joye, M .
ELECTRONICS LETTERS, 2002, 38 (19) :1095-1097