On Avoiding ZVP-Attacks Using Isogeny Volcanoes
نویسندگان
چکیده
The usage of elliptic curve cryptography in smart cards has been shown to be efficient although, when considering curves, one should take care about their vulnerability against the Zero-Value Point Attacks (ZVP). In this paper, we present a new procedure to find elliptic curves which are resistant against these attacks. This algorithm finds, in an efficient way, a secure curve by means of volcanoes of isogenies. Moreover, we can deal with one more security condition than Akishita-Takagi method with our search.
منابع مشابه
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
The isogeny for elliptic curve cryptosystems was initially used for the efficient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny for resisting the refined differential power analysis by Goubin (Goubin’s attack). In this paper, we examine the countermeasure using isogeny against zero-value point (ZVP) attack that is generalization of Goubin’s att...
متن کاملAn Analysis of ZVP-Attack on ECC Cryptosystems
Elliptic curve cryptography (ECC) is an efficient public cryptosystem with a short key size. For this reason it is suitable for implementing on memory-constraint devices such as smart cards, mobile devices, etc. However, these devices leak information about their private key through side channels (power consumption, electromagnetic radiation, timing etc) during cryptographic processing. In this...
متن کاملComputing isogeny volcanoes of composite degree
Isogeny volcanoes are an interesting structure that have had several recent applications. An isogeny volcano is a connected component of a larger graph called a cordillera. In this paper, we further explore properties of how to compute volcanoes given that we have already computed one of a different degree. This allows us to compute volcanoes of composite degree more efficiently than a direct c...
متن کاملIsogeny volcanoes
The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them an important tool for computational number theorists and practitioners of elliptic curve cryptography. This expository paper recounts the theory behind these graphs and examines several recently developed algorithms that realize substantial (often dramatic) performan...
متن کاملPairing the Volcano
Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are `-isogenies. Algorithms allowing to travel on these graphs were developed by Kohel in his thesis (1996) and later on, by Fouquet and Morain (2001). However, up to now, no method was known, to predict, before taking a step on the volcano, the direction of this step. Hence, in Kohel's and Fouquet-Morain algorithms...
متن کامل