Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks(Tamper-Resistance)(<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes fast elliptic curve multiplication algorithms resistant against side channel attacks, based on the Montgomery-type scalar multiplication. The proposed scalar multiplications can be applied to all curves over prime fields, e. g., any standardized curves over finite fields with characteristic larger than 3. The method utilizes the addition formulas xECDBL and xECADD assembled by only x-coordinates of points, and is applicable for any types of curves over finite fields. Then, we encapsulate two addition formulas into one formula xECADDDBL, which accomplishes a faster computation because several auxiliary variables of two formulas can be shared. We also develop a novel addition chain for the new formula, with which we can compute scalar multiplications. The improvement of our scalar multiplications over previous Coron's dummy operation method is about 18% for a 160-bit scalar multiplication. Our method requires no table-up of precomputed points and it is suitable for the implementation on memory constraint computing architectures, e. g., smart cards. Moreover, we optimize the proposed algorithms for parallelized implementations with SIMD operations. Compared with the similar scheme proposed by Fischer et al., our scheme is about 16% faster.
- 社団法人電子情報通信学会の論文
- 2005-01-01
著者
-
Izu Tetsuya
Secure Computing Lab. Fujitsu Laboratories Ltd.
-
Izu Tetsuya
Secure Computing Laboratory Fujitsu Laboratories Ltd.
-
TAKAGI Tsuyoshi
Fachbereich Informatik, Technische Universitat Darmstadt
-
Takagi Tsuyoshi
Fachbereich Informatik Technische Universitat Darmstadt
関連論文
- Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate
- A Practical Countermeasure against Address-bit Differential Power Analysis (特集:プライバシを保護するコンピュータセキュリティ技術)
- Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks(Tamper-Resistance)(Cryptography and Information Security)
- Fast Elliptic Curve Multiplications with SIMD Operations (Asymmetric Cipher) (Cryptography and Information Security)
- SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF (Asymmetric Cipher) (Cryptography and Information Security)
- A Fast RSA-Type Public-Key Primitive Modulo p^kq Using Hensel Lifting (Asymmetric Cipher) (Cryptography and Information Security)
- Zero-Value Register Attack on Elliptic Curve Cryptosystem(Tamper-Resistance)(Cryptography and Information Security)
- On the Optimal Parameter Choice for Elliptic Curve Crystosystem Using Isogeny(Tamper-Resistance)(Cryptography and Information Security)