Zero-Value Register Attack on Elliptic Curve Cryptosystem(Tamper-Resistance)(<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
Differential power analysis (DPA) might break implementations of elliptic curve cryptosystem (ECC) on memory constraint devices. Goubin proposed a variant of DPA using a point (0, y), which is not ran- domized in Jacobian coordinates or in an isomorphic class. This point often exists in standardized elliptic curves, and we have to care this attack. In this paper, we propose zero-value register attack as an extension of Goubin's attack. Note that even if a point has no zero-value coordinate, auxiliary registers might take zero value. We investigate these zero-value registers that cannot be randomized by the above randomization. Indeed, we have found several points P=(x, y) which cause the zero-value registers, e. g., (1) 3x^2+a=0, (2) 5x^4+2ax^2-4bx+a^2=0, (3) P is y-coordinate self-collision point, etc. We demonstrate the elliptic curves recommended in SECG that have these points. Interestingly, some conditions required for zero-value register attack depend on explicit implementation of addition formulae-in order to resist this type of attacks, we have to care how to implement the addition formulae. Finally, we note that Goubin's attack and the proposed attack assume that a base point P can be chosen by attackers and a secret scalar d is fixed, so that they are not applicable to ECDSA.
- 社団法人電子情報通信学会の論文
- 2005-01-01
著者
-
Takagi Tsuyoshi
Fachbereich Informatik Technische Universitat Darmstadt
-
AKISHITA Toru
Information Technologies Laboratories, Sony Corporation
-
Akishita T
Information Technologies Laboratories Sony Corporation
-
Akishita Toru
Information Technologies Laboratories Sony Corporation
関連論文
- Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Fast Elliptic Curve Multiplications with SIMD Operations (Asymmetric Cipher) (Cryptography and Information Security)
- SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF (Asymmetric Cipher) (Cryptography and Information Security)
- A Fast RSA-Type Public-Key Primitive Modulo p^kq Using Hensel Lifting (Asymmetric Cipher) (Cryptography and Information Security)
- Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors(Elliptic Curve Cryptography, Cryptography and Information Security)
- Zero-Value Register Attack on Elliptic Curve Cryptosystem(Tamper-Resistance)(Cryptography and Information Security)
- On the Optimal Parameter Choice for Elliptic Curve Crystosystem Using Isogeny(Tamper-Resistance)(Cryptography and Information Security)