Advertisement

Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve

  • Loren D. Olson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3156)

Abstract

Side-channel attacks in elliptic curve cryptography occur with the unintentional leakage of information during processing. A critical operation is that of computing nP where n is a positive integer and P is a point on the elliptic curve E. Implementations of the binary algorithm may reveal whether P+Q is computed for \(P\ne Q\) or P=Q as the case may be. Several methods of dealing with this problem have been suggested. Here we describe a general technique for producing a large number of different representations of the points on E in characteristic p≥ 5, all having a uniform implementation of P+Q. The parametrization may be changed for each computation of nP at essentially no cost. It is applicable to all elliptic curves in characteristic p≥ 5, and thus may be used with all curves included in present and future standards for p≥ 5.

Keywords

Elliptic curves ECC cryptography side-channel attacks weighted projective curves uniform addition formula 

References

  1. 1.
    Liardet, P.-V., Smart, N.B.: Preventing SPA/DPA in ECC Systems Using the Jacobi Form. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 391–401. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    Joye, M., Quisquater, J.-J.: Hessian Elliptic Curves and Side-Channel Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 402–410. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Billet, O., Joye, M.: The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. In: Fossorier, M.P.C., Høholdt, T., Poli, A. (eds.) AAECC 2003. LNCS, vol. 2643, pp. 34–42. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Reid, M.: Graded rings and varieties in weighted projective space. Manuscript, M. Reid’s Web page www.maths.warwick.ac.uk/~miles/surf/more/grad.pdf (January 2002)
  5. 5.
    Fricke, R.: Die elliptische Funktionen und ihre Anwendungen, B.G. Teubner (1922) Google Scholar
  6. 6.
    Brier, É., Joye, M.: Weierstraß Elliptic Curves and Side-Channel Attacks. In: Naccache, D., Paillier, P. (eds.) PKC 2002. LNCS, vol. 2274, pp. 335–345. Springer, Heidelberg (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Loren D. Olson
    • 1
  1. 1.Dept. of Mathematics and StatisticsUniversity of TromsøTromsøNorway

Personalised recommendations