Elliptic Curves and Side-Channel Analysis
نویسنده
چکیده
Naive implementations of crypto-algorithms are susceptible to side-channel analysis. This paper surveys the known methods for preventing side-channel analysis in elliptic curve cryptosystems.
منابع مشابه
Elliptic Curves and Side-Channel Attacks
Naive implementations of crypto-algorithms are susceptible to side-channel analysis. This talk surveys the known methods for preventing side-channel analysis in elliptic curve cryptosystems.
متن کاملSide-Channel Analysis on Blinded Regular Scalar Multiplications
We present a new side-channel attack path threatening stateof-the-art protected implementations of elliptic curves embedded scalar multiplications. Regular algorithms such as the double-and-add-always and the Montgomery ladder are commonly used to protect the scalar multiplication from simple side-channel analysis. Combining such algorithms with scalar and/or point blinding countermeasures lead...
متن کاملSame Value Analysis on Edwards Curves
Recently, several research groups in cryptography have presented new elliptic curve model based on Edwards curves. These new curves were selected for their good performance and security perspectives. Cryptosystems based on elliptic curves in embedded devices can be vulnerable to Side-Channel Attacks (SCA), such as the Simple Power Analysis (SPA) or the Differential Power Analysis (DPA). In this...
متن کاملImplementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks
Many software implementations of public key cryptosystems have been concerned with efficiency. The advent of side channel attacks, such as timing and power analysis attacks, force us to reconsider the strategy of implementation of group arithmetic. This paper presents a study of software counter measures against side channel attacks for elliptic curve cryptosystems. We introduce two new counter...
متن کاملSecuring Elliptic Curve Point Multiplication against Side-Channel Attacks
For making elliptic curve point multiplication secure against side-channel attacks, various methods have been proposed using special point representations for specifically chosen elliptic curves. We show that the same goal can be achieved based on conventional elliptic curve arithmetic implementations. Our point multiplication method is much more general than the proposals requiring non-standar...
متن کامل