Resistance of Randomized Projective Coordinates Against Power Analysis

نویسندگان

  • William Dupuy
  • Sébastien Kunz-Jacques
چکیده

Embedded devices implementing cryptographic services are the result of a trade-off between cost, performance and security. Aside from flaws in the protocols and the algorithms used, one of the most serious threats against secret data stored in such devices is Side Channel Analysis. Implementing Public Key Cryptography in low-profile devices such as smart cards is particularly challenging given the computational complexity of the operations involved. In the area of elliptic curve cryptography, some choices of curves and coefficient fields are known to speed up computations, like scalar multiplication. From a theoretical standpoint, the use of optimized structures does not seem to weaken the cryptosystems which use them. Therefore several standardization bodies, such as the NIST, recommend such choices of parameters. However, the study of their impact on practical security of implementations may have been underestimated. In this paper, we present a new chosen-ciphertext Side-Channel Attack on scalar multiplication that applies when optimized parameters, like NIST curves, are used together with some classical anti-SPA and antiDPA techniques. For a typical exponent size, the attack allows to recover a secret exponent by performing only a few hundred adaptive power measurements.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Performance Evaluation of Elliptic Curve Projective Coordinates with Parallel GF(p) Field Operations and Side-Channel Atomicity

This paper presents performance analysis and evaluation of elliptic curve projective coordinates with parallel field operations over GF(p). Side-channel atomicity has been used in these comparisons. The field computations of point operations are segmented into atomic blocks that are indistinguishable from each other to resist against simple power analysis attacks. These atomic blocks are execut...

متن کامل

Overlapped parallel computations of scalar multiplication with resistance against Side Channel Attacks

This paper presents an efficient scheme for computing elliptic curve scalar multiplication. The proposed scheme uses side-channel atomicity to resist against simple power analysis (SPA) attacks. The inherent parallelism within point operations is exploited to perform parallel computations of atomic blocks within the same point operation. The computations of atomic blocks of subsequent point ope...

متن کامل

بررسی تفاوت‌های جنسی و طبقه اجتماعی در منبع مهارگذاری گروهی از دانش‌آموزان مقطع راهنمایی شهر شیراز

The aim of the present study was to examine the effect of gender and social class differences on locus of control in a group of Junior high school students. 144 students at second and third grades of school were randomly selected by using a cluster sampling procedure. Subjects completed the Nowicki-Strickland locus of control scale, which were adopted for Iranian population by Khair (25). Khair...

متن کامل

Corelation between antibiotic resistans and biofilm formation power of Pseudomonas aeruginosa

P. aeruginosa has been mentioned as the major causative agents of nosocomial infections. Pseudomonas infections are often serious and show different resistance to treatment due to distribution of antimicrobial resistance. Meanwhile, some strains are also able to form biofilm during contamination, which help bacteria to be even more persisyant to yreatment. We examined the antibiotic resistance ...

متن کامل

(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography

Randomization techniques play an important role in the protection of cryptosystems against implementation attacks. This paper studies the case of elliptic curve cryptography and propose three novel randomization methods, for the elliptic curve point multiplication, which do not impact the overall performance. Our first method, dedicated to elliptic curves over prime fields, combines the advanta...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005