Abstract
The usage of elliptic curve cryptography in smart cards has been shown to be efficient although, when considering curves, one should take care about their vulnerability against the Zero-Value Point Attacks (ZVP). In this paper, we present a new procedure to find elliptic curves which are resistant against these attacks. This algorithm finds, in an efficient way, a secure curve by means of volcanoes of isogenies. Moreover, we can deal with one more security condition than Akishita-Takagi method with our search.
Partially supported by grants MTM2007-66842-C02-01, MTM2007-66842-C02-02 and TIN2006-15662-C02-02 from Spanish MCyT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akishita, T., Takagi, T.: Zero-Value point attacks on elliptic curve cryptosystem. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 218–233. Springer, Heidelberg (2003)
Akishita, T., Takagi, T.: On the optimal parameter choice for elliptic curve cryptosystems using isogeny. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 346–359. Springer, Heidelberg (2004)
Blake, F., Seroussi, G., Smart, N.: Elliptic Curves un Criptography. London Mathematical Society Lecture Notes, vol. 256. Cambridge University Press, Cambridge (1999)
Charles, D., Lauter, K.: Computing modular polynomials. Journal of Computation and Mathematics. London Mathematical Society 8, 195–204 (2005)
Coron, J.S.: Resistance against differential power analysis for elliptic curve cryptosystems. In: Koç, Ç.K., Paar, C. (eds.) CHES 1999. LNCS, vol. 1717, pp. 292–302. Springer, Heidelberg (1999)
Fouquet, M., Morain, F.: Isogeny volcanoes and the SEA algorithm. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 276–291. Springer, Heidelberg (2002)
Galbraith, S.: Constructing isogenies between elliptic curves over finite fields. Journal of Computational Mathematics 2, 118–138 (1999)
Goubin, L.: A refined power-analysis attack on elliptic curve cryptosystems. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 199–211. Springer, Heidelberg (2002)
Joye, M.: Elliptic curves and side-channel analysis. ST Journal of System Research 4(1), 283–306 (2003)
Joye, M., Tymen, C.: Protections against differential analysis for elliptic curve cryptography - An algebraic approach. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 377–390. Springer, Heidelberg (2001)
Kocher, P., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
Kohel, D.: Endomorphism rings of elliptic curves over finite fields. PhD thesis, University of California, Berkeley (1996)
Bosma, W., Canon, J.: Handbook of Magma functions. MAGMA Group. Sydney (2003), http://magam.maths.usyd.edu.au/
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)
Miret, J., Moreno, R., Sadornil, D., Tena, J., Valls, M.: Computing the height of volcanoes of ℓ–isogenies of elliptic curves over finite fields. Applied Mathematics and Computation 196(1), 67–76 (2008)
Miret, J., Sadornil, D., Tena, J., Tomàs, R., Valls, M.: Isogeny cordillera algorithm to obtain cryptographically good elliptic curves. In: Australasian Information Security Workshop: Privacy Enhancing Tecnologies (AISW), CRPIT, vol. 68, pp. 127–131 (2007)
Standard for Efficient Cryptography (SECG). SEC2: Recommended Elliptic Curve Domain Parameters, Version 1.0 (2000), http://www.secg.org/secg_docs.htm
Smart, N.: An analysis of Goubin’s refined power analysis attack. In: Walter, C.D., Koç, Ç.K., Paar, C. (eds.) CHES 2003. LNCS, vol. 2779, pp. 281–290. Springer, Heidelberg (2003)
Vélu, J.: Isogénies entre courbes elliptiques. C. R. Acad. Sci. Paris, Ser. I Math., Serie A 273, 238–241 (1971)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Miret, J., Sadornil, D., Tena, J., Tomàs, R., Valls, M. (2009). On Avoiding ZVP-Attacks Using Isogeny Volcanoes. In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-00306-6_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-00305-9
Online ISBN: 978-3-642-00306-6
eBook Packages: Computer ScienceComputer Science (R0)