Elliptic Curves and Side-Channel Attacks

نویسنده

  • Marc Joye
چکیده

Naive implementations of crypto-algorithms are susceptible to side-channel analysis. This talk surveys the known methods for preventing side-channel analysis in elliptic curve cryptosystems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

In this paper we introduce two new generic sidechannel attacks on scalar blinding of elliptic curves where the order of the base point is close to a power of 2. These attacks are in particu­ lar relevant for elliptic curves over special prime fields where the prime is ’almost’ a power of 2. As in the papers [9, 10] we assume that some side-channel attack has allowed the determina­ tion of the b...

متن کامل

Securing Elliptic Curve Point Multiplication against Side-Channel Attacks

For making elliptic curve point multiplication secure against side-channel attacks, various methods have been proposed using special point representations for specifically chosen elliptic curves. We show that the same goal can be achieved based on conventional elliptic curve arithmetic implementations. Our point multiplication method is much more general than the proposals requiring non-standar...

متن کامل

Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks

We improve several elliptic curve multiplication algorithms secure against side channel attacks (SCA). While some efficient SCAresistant algorithms were developed that apply only to special classes of curves, we are interested in algorithms that are suitable for general elliptic curves and can be applied to the recommended curves found in various standards. We compare the running time and memor...

متن کامل

Weierstraß Elliptic Curves and Side-Channel Attacks

Recent attacks show how an unskilled implementation of elliptic curve cryptosystems may reveal the involved secrets from a single execution of the algorithm. Most attacks exploit the property that addition and doubling on elliptic curves are different operations and so can be distinguished from side-channel analysis. Known countermeasures suggest to add dummy operations or to use specific param...

متن کامل

Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks

Many software implementations of public key cryptosystems have been concerned with efficiency. The advent of side channel attacks, such as timing and power analysis attacks, force us to reconsider the strategy of implementation of group arithmetic. This paper presents a study of software counter measures against side channel attacks for elliptic curve cryptosystems. We introduce two new counter...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003