SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF (Asymmetric Cipher) (<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
The side channel attack (SCA) is a serious attack on wearable devices that have scarce computational resources. Cryptographic algorithms on them should be efficient using small memory-we have to make efforts to optimize the trade-off between efficiency and memory. In this paper we present efficient SCA-resistant scalar multiplications based on window method. Moller proposed an SPA-resistant window method based on 2^ω-ary window method, which replaces tw-consecutive zeros to 1 plus to-consecutive 1 and it requires 2^ω points of table (or 2^<ω-1>+1 points if the signed 2^<ω-ary> is used). The most efficient window method with small memory is the width-ω NAF, which requires 2^<ω-2> points of table. In this paper we convert the width-ω NAF to an SPA-resistant addition chain. Indeed we generate a scalar sequence with the fixed pattern, e.g. |0 ・ ・ ・ 0x|0 ・ ・ ・ 0x| ・ ・ ・|0 ・ ・ ・ 0x|, where x is positive odd points < 2^ω. Thus the size of the table is 2^<ω-1>, which is optimal in the construction of the SPA-resistant chain based on width-ω NAF. The table sizes of the proposed scheme are 6% to 50% smaller than those of Moller's scheme for ω=2,3,4,5, which are relevant choices in the sense of efficiency for 160-bit ECC.
- 社団法人電子情報通信学会の論文
- 2004-01-01
著者
-
OKEYA Katsuyuki
Systems Development Laboratory, Hitachi Ltd.
-
Takagi T
Fachbereich Informatik Technische Universitat Darmstadt
-
Okeya Katsuyuki
Systems Development Laboratory Hitachi Ltd.
-
TAKAGI Tsuyoshi
Fachbereich Informatik, Technische Universitat Darmstadt
-
Takagi Tsuyoshi
Fachbereich Informatik Technische Universitat Darmstadt
関連論文
- Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers
- Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers
- Faster Double-Size Bipartite Multiplication out of Montgomery Multipliers
- Montgomery Multiplication with Twice the Bit-Length of Multipliers
- Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems(Special Section on Cryptography and Information Security)
- Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Fast Elliptic Curve Multiplications with SIMD Operations (Asymmetric Cipher) (Cryptography and Information Security)
- SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF (Asymmetric Cipher) (Cryptography and Information Security)
- Defeating Simple Power Analysis on Koblitz Curves(Discrete Mathematics and Its Applications)
- Security Analysis of the SPA-Resistant Fractional Width Method(Elliptic Curve Cryptography, Cryptography and Information Security)
- Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication(Discrete Mathematics and Its Applications)
- Side Channel Attacks against Hash-Based MACs with PGV Compression Functions
- On the Importance of Protecting Δ in SFLASH against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems(Discrete Mathematics and Its Applications)
- A Fast RSA-Type Public-Key Primitive Modulo p^kq Using Hensel Lifting (Asymmetric Cipher) (Cryptography and Information Security)
- Zero-Value Register Attack on Elliptic Curve Cryptosystem(Tamper-Resistance)(Cryptography and Information Security)
- On the Optimal Parameter Choice for Elliptic Curve Crystosystem Using Isogeny(Tamper-Resistance)(Cryptography and Information Security)