(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography

  • Mathieu Ciet
  • Marc Joye
Conference paper

DOI: 10.1007/978-3-540-39927-8_32

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2836)
Cite this paper as:
Ciet M., Joye M. (2003) (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. In: Qing S., Gollmann D., Zhou J. (eds) Information and Communications Security. ICICS 2003. Lecture Notes in Computer Science, vol 2836. Springer, Berlin, Heidelberg

Abstract

Randomization techniques play an important role in the protection of cryptosystems against implementation attacks. This paper studies the case of elliptic curve cryptography and propose three novel randomization methods, for the elliptic curve point multiplication, which do not impact the overall performance.

Our first method, dedicated to elliptic curves over prime fields, combines the advantages of two previously known solutions: randomized projective coordinates and randomized isomorphisms. It is a generic point randomization and can be related to a certain multiplier randomization technique. Our second method introduces new elliptic curve models that are valid for all (non-supersingular) elliptic curves over binary fields. This allows to use randomized elliptic curve isomorphisms, which in turn allows to randomly compute on elliptic curves with affine coordinates. Our third method adapts a double ladder attributed to Shamir. We insist that all our randomization methods share the common feature to be free: the cost of our randomized implementations is virtually the same as the cost of the corresponding non-randomized implementations.

Keywords

Randomization elliptic curve cryptography implementation attacks side-channel analysis elliptic curve models point multiplication algorithms 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Mathieu Ciet
    • 1
  • Marc Joye
    • 2
  1. 1.UCL Crypto GroupLouvain-la-NeuveBelgium
  2. 2.Gemplus, Card Security Group, La VigieLa Ciotat CedexFrance

Personalised recommendations