Fast elliptic curve scalar multiplication for resisting against SPA

被引:5
|
作者
Liu, Shuanggen [1 ]
Yao, Huatong [1 ]
Wang, Xu An [2 ]
机构
[1] Xian Univ Posts & Telecommun, Sch Telecommun & Informat Engn, Xian 710121, Shaanxi, Peoples R China
[2] Engn Univ Chinese Armed Police Force, Xian 710078, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
elliptic curve scalar multiplication; simple power analysis; SPA; highest-weight symbolic ternary form; HSTF;
D O I
10.1504/IJCSE.2018.095845
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper analyses the computation of symbolic ternary form (STF) elliptic curve scalar multiplication algorithm and binary scalar multiplication algorithm. Compared with binary scalar multiplication algorithm, the efficiency of STF scalar multiplication algorithm is increased by 5.9% on average and has a corresponding advantage. For this reason, we improve the structure of STF scalar multiplication algorithm and make the performance more 'smooth' by constructing indistinguishable operation between points addition (A) and triple point (T) and thus to resist against the simple power analysis attacks. At the same time, we propose highest-weight symbolic ternary form (HSTF), which makes a scalar k transform into the highest-weight form. Thus, every cycle has a fixed pattern to resist against SPA attack. With respect to binary scalar multiplication algorithm with anti-SPA, the average efficiency in enhanced by 17.7%.
引用
收藏
页码:343 / 352
页数:10
相关论文
共 50 条
  • [31] Profiled Attacks Against the Elliptic Curve Scalar Point Multiplication Using Neural Networks
    Barenghi, Alessandro
    Carrera, Diego
    Mella, Silvia
    Pace, Andrea
    Pelosi, Gerardo
    Susella, Ruggero
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 238 - 257
  • [32] The elliptic scalar multiplication graph and its application in elliptic curve cryptography
    Aljamaly, Karrar Taher R.
    Ajeena, Ruma Kareem K.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (06): : 1793 - 1807
  • [33] Fast Elliptic Curve Point Multiplication for WSNs
    Kodali, Ravi Kishore
    Karanam, Srikrishna
    Patel, Kashyapkumar
    Budwal, Harpreet Singh
    2013 IEEE TENCON SPRING CONFERENCE, 2013, : 194 - 198
  • [34] On Fast Implementations of Elliptic Curve Point Multiplication
    Morales, Einstein
    ACMSE 2022: PROCEEDINGS OF THE 2022 ACM SOUTHEAST CONFERENCE, 2022, : 173 - 180
  • [35] Implementation and Comparison of SPA and DPA Countermeasures for Elliptic Curve Point Multiplication
    Ostrowski, Lukasz
    Marcinek, Krzysztof
    Pleskacz, Witold A.
    PROCEEDINGS OF THE 2019 26TH INTERNATIONAL CONFERENCE MIXED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (MIXDES 2019), 2019, : 227 - 230
  • [36] Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors
    Dubeuf, Jeremy
    Hely, David
    Beroulle, Vincent
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 65 - 82
  • [37] Integer decomposition for fast scalar multiplication on elliptic curves
    Kim, D
    Lim, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 13 - 20
  • [38] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 2833 - 2842
  • [39] Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion
    Jin, Yaoan
    Miyaji, Atsuko
    COMPUTER JOURNAL, 2024, 67 (02): : 474 - 484
  • [40] Elliptic curve scalar multiplication algorithm using complementary recoding
    Balasubramaniam, P.
    Karthikeyan, E.
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 190 (01) : 51 - 56