Abstract
The development of side-channel and fault injection attacks against the implementation of algorithms used in elliptic curve cryptography (ECC), has pointed out that it is not enough to implement efficient algorithms that are secure from a theoretical point of view. In this sense, it is necessary to design algorithms that do not leak information which could allow an attacker to obtain the used keys, thus making the physical implementations of those algorithms resistent to this kind of attacks. In this work, some of the options to implement the scalar multiplication for elliptic curves are described.
To our colleague and friend Jaime Muñoz Masqué, so that he had something to “think about” and give us ideas for the future, on the occasion of his 65th birthday
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Brier, E., Joye, M.: Weierstrass elliptic curves and side-channel attacks. Lect. Notes Comput. Sci. 2274, 335–345 (2002)
Cohen, H., Miyaji, A., Ono, T.: Efficient elliptic curve exponentiation using mixed coordinates. Lect. Notes Comput. Sci. 1514, 51–65 (1998)
Coron, J.S.: Resistance against differential power analysis for elliptic curve cryptosystems. Lect. Notes Comput. Sci. 1717, 292–302 (1999)
Fischer, W., Giraud, C., Knudsen, E.W., Seifert, J.P.: Parallel scalar multiplication on general elliptic curves over \({\mathbb{F}}_p\) hedged against non-differential side-channel attacks. Cryptology ePrint Archive, Report 2002/007
Fúster Sabater, A., Hernández Encinas, L., Martín Muñoz, A., Montoya Vitini, F., Muñoz Masqué, J.: Criptografía, protección de datos y aplicaciones. RA-MA, Madrid (2012)
Gordon, D.M.: A survey of fast exponentiation methods. J. Algorithms 27(1), 129–146 (1998)
Goundar, R., Joye, M., Miyaji, A.: Co-Z addition formula and binary ladders on elliptic curves. Lect. Notes Comput. Sci. 6225, 65–79 (2010)
Goundar, R., Joye, M., Miyaji, A., Rivain, A., Venelli, A.: Scalar multiplication on Weierstrass elliptic curves from co-Z arithmetic. J. Cryptogr. Eng. 1(2), 161–176 (2011)
Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2004)
Izu, T., Takagi, T.: A fast parallel elliptic curve multiplication resistant against side channel attacks. Lect. Notes Comput. Sci. 2274, 280–296 (2002)
Joye, M.: Highly regular right-to-left algorithms for scalar multiplication. Lect. Notes Comput. Sci. 4727, 135–147 (2007)
Joye, M.: Fast point multiplication on elliptic curves without precomputation. In: Proceedings of WAIFI 2008
Joye, M.: Highly regular \(m\)-ary powering ladders. Lect. Notes Comput. Sci. 5867, 350–363 (2009)
Koyama, K., Tsuruoka, Y.: Speeding up elliptic cryptosystems by using a signed binary window method. Lect. Notes Comput. Sci. 740, 345–357 (1993)
Meloni, N.: New point addition formulae for ECC applications. Lect. Notes Comput. Sci. 4547, 189–201 (2007)
Möller, B.: Improved techniques for fast exponentiation. Lect. Notes Comput. Sci. 2587, 298–312 (2003)
Montgomery, P.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48, 243–264 (1987)
NSA, NSA Suite B cryptography. National Security Agency (2005)
Rivain, M.: Fast and regular algorithms for scalar multiplication over elliptic curves. Cryptology ePrint Archive, Report 2011/338
Venelli, A., Dassance, F.: Faster side-channel resistant elliptic curve scalar multiplication. Contemp. Math. 521, 29–40 (2010)
Verneuil, V.: Elliptic curve cryptography and security of embedded devices. Ph.D. Thesis. Ècole Doctorale de Mathèmatiques et Informatique, Universitè de Bordeaux (France) (2010)
Yao, A.C.C.: On the evaluation of powers. SIAM J. Comput. 5(1), 100–103 (1976)
Yen, S.M., Joye, M.: Checking before output may not be enough against fault-based cryptanalysis. IEEE Trans. Comput. 49(9), 967–970 (2000)
Acknowledgments
This work has been partially supported by project TIN2014-55325-C2-1-R (ProCriCiS), funded by Ministerio de Economía y Competitividad, Spain.
We thank Jaime Muñoz Masqué for his continuous and challenging ideas to address new research objectives, as well as for all his useful suggestions to overcome so many obstacles.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Gayoso Martínez, V., Hernández Encinas, L., Martín Muñoz, A. (2016). Implementation of Cryptographic Algorithms for Elliptic Curves. In: Castrillón López, M., Hernández Encinas, L., Martínez Gadea, P., Rosado María, M. (eds) Geometry, Algebra and Applications: From Mechanics to Cryptography. Springer Proceedings in Mathematics & Statistics, vol 161. Springer, Cham. https://doi.org/10.1007/978-3-319-32085-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-32085-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32084-7
Online ISBN: 978-3-319-32085-4
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)