CryptoDB
A comb method to render ECC resistant against Side Channel Attacks
Authors: | |
---|---|
Download: | |
Abstract: | Side Channel Attacks may exploit leakage information to break cryptosystems on smard card devices. In this paper we present a new SCA-resistant elliptic curve scalar multiplication algorithm, based on the Lim and Lee technique. The proposed algorithm builds a sequence of bit-strings representing the scalar $k$, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behaviour for the algorithm, and thus will make it secure against SPA (Simple Power Analysis) attacks. The use of a recently introduced randomization technique achieves the security of the proposed scheme against other SCA attacks. Furthermore, the proposed countermeasures do not penalize the computation time |
BibTeX
@misc{eprint-2004-12306, title={A comb method to render ECC resistant against Side Channel Attacks}, booktitle={IACR Eprint archive}, keywords={implementation / ECC, SCA attacks, scalar multiplication}, url={http://eprint.iacr.org/2004/342}, note={paper submitted only to the Cryptology ePrint Archive. hedabou@insa-toulouse.fr 12754 received 2 Dec 2004}, author={Mustapha Hedabou and Pierre Pinel and Lucien B?n?teau}, year=2004 }