Skip to main content
Log in

An efficient method against side-channel attacks on ECC

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Side-channel attacks (SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks (SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than MÖller's one, its cost being about 5% to 10% smaller than MÖller's one.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Okeya K, Han D G. Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scale Multiplication [C]//Indocrypt 2003 (LNCS 2904), Berlin: Springer-Verlag, 2003:334–348.

    Google Scholar 

  2. Coron J S. Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems[C]//Cryptography Hardware and Embedded Systems-CHES'99 (LNCS 1717) Berlin: Springer-Verlag, 1999:292–302.

    Google Scholar 

  3. Liardet P V, Smart N. Preventing SPA/DPA in ECC Systems Using the Jacobi Form[C]//Cryptography Hardware and Embedded Systems-CHES'01 (LNCS 2106) Berlin Heidelberg: Springer-Verlag, 2001:401–411.

    Google Scholar 

  4. Joye M, Quisquater J J. Hessian Elliptic Curves and Side-Channel Attacks[C]//Cryptography Hardware and Embedded Systems-CHES'01 (LNCS 2162), Berlin Heidelberg: Springer-Verlag, 2001:412–420.

    Google Scholar 

  5. Joye M, Tymen C. Protections Against Differential Analysis for Elliptic Curve Cryptography: An Algebraic Approach [C]//Cryptography Hardware and Embedded Systems- CHES'01(LNCS 2162), Berlin: Springer-Verlag, 2001:386–400.

    Google Scholar 

  6. Lopez J, Dahab R. Fast Multiplication on Elliptic Curves over GF(2m) without Precomputation[C]//Cryptography Hardware and Embedded Systems-CHES'99(LNCS 1717), Berlin: Springer-Verlag, 1999:316–327.

    Google Scholar 

  7. Okeya K, Sakurai K. A Second-Order DPA Attacks Breaks a Window-Method Based Countermeasure Against Side Channel Attacks[C]//Information Security Conference2002(LNCS 2433), Berlin: Springer-Verlag, 2002:389–401.

    Google Scholar 

  8. MÖller B. Securing Elliptic Curve Point Multiplication Against Side-Channel Attacks [C]//Information Security Conference2001 (LNCS 2200), Berlin: Springer-Verlag, 2001:324–334.

    Google Scholar 

  9. Montgomery P L. Speeding up the Pollard and Elliptic Curve Methods of Factorization[J].Mathematics of Computation, 198748(177):243–264.

    Article  MATH  MathSciNet  Google Scholar 

  10. National Institute of Standard and Technology(NIST). Digital Signature Standard(DSS)[S].FIPS PUB, 186-2 2000.

  11. Certicom Research. Standard for Efficient Cryptography[S]. Version 1.0, 2000, Available at url http:/www.secg.org/.

  12. Brown M, Hankerson D, Lopez J,et al., Software Implementation of the NIST Elliptic Curves over Prime Fields [C]//Progress in Cryptology CT-RSA 2001 (LNCS 2020), Berlin: Springer-Verlag, 2001:250–265.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hu Yupu.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60473029)

Biography: LIU Shuanggen (1979-) male, Ph. D. candidate, working in Jiangxi Normal University, research direction: cryptology and information Security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shuanggen, L., Yupu, H. & Wensheng, X. An efficient method against side-channel attacks on ECC. Wuhan Univ. J. Nat. Sci. 11, 1573–1576 (2006). https://doi.org/10.1007/BF02831823

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831823

Key words

CLC number

Navigation