Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors

被引:7
|
作者
Dubeuf, Jeremy [1 ]
Hely, David [2 ]
Beroulle, Vincent [2 ]
机构
[1] Maxim Integrated, Secur Excellence Lab, San Jose, CA 95134 USA
[2] Univ Grenoble Alpes, LCIS, Grenoble, France
关键词
Elliptic curve cryptography; Point multiplication algorithms; Security issues; Forced bit; Safe-error; Dummy operands; Smartcard; POWER-ANALYSIS; EFFICIENT COUNTERMEASURES;
D O I
10.1007/978-3-319-64647-3_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic curve cryptography (ECC) is involved in many secure schemes. Such schemes involve the elliptic curve scalar operation which is particularly security sensitive. Many algorithms of this operation have been proposed including security countermeasures. This paper discusses the security issues of such algorithms when running on a device that can be physically accessed. Leveraging these issues, new simple attack schemes to recover scalar bit information are presented and a new detailed attack based on C safe-error, probability and lattice is described against an Elliptic Curve Digital Signature Algorithm (ECDSA) using the Montgomery ladder algorithm. This new attack shows that Montgomery ladder can be sensitive to C safe-errors under some conditions. Finally, new secure elliptic curve scalar operation algorithms are presented with solutions to the discussed issues and guidance for their secure implementations.
引用
收藏
页码:65 / 82
页数:18
相关论文
共 50 条
  • [21] Elliptic Curve Cryptosystems and Scalar Multiplication
    Constantinescu, Nicolae
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2010, 37 (01): : 27 - 34
  • [22] Scalar multiplication in elliptic curve libraries
    Alimoradi, Reza
    Arkian, Hamid Reza
    Razavian, Seiied-Mohammad-Javad
    Ramzi, Ali
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (03): : 657 - 666
  • [23] Efficient and Secure Elliptic Curve Scalar Multiplication Based on Quadruple-and-Add
    Liu, Shuang-Gen
    An, Si-Jia
    Du, Yi-Wei
    International Journal of Network Security, 2021, 23 (05) : 750 - 757
  • [24] The width-w NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks
    Okeya, K
    Takagi, T
    TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 328 - 342
  • [25] A Novel Elliptic Curve Scalar Multiplication Algorithm against Power Analysis
    Liu, Hongming
    Zhou, Yujie
    Zhu, Nianhao
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [26] Implementation of elliptic curve cryptography with built-in counter measures against side channel attacks
    Trichina, E
    Bellezza, A
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 98 - 113
  • [27] Fast Computation of Scalar Multiplication over Binary Edwards Curve Processor Against Side Channel Attack
    Venkatasubramani, V. R.
    Kumar, G. Ram
    Vignesh, K.
    ManiRajan, G.
    Rajaram, S.
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,
  • [28] Secure Outsourcing of Scalar Multiplication on Elliptic Curves
    Zhou, Kai
    Ren, Jian
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [29] A FAST AND SECURE ELLIPTIC CURVE SCALAR MULTIPLICATION ALGORITHM OVER GF(p(m))
    Liu, Shuang-Gen
    Hu, Yu-Pu
    Ni, Hai-Ying
    Xu, Wen-Sheng
    Liao, Yun-Yan
    JOURNAL OF INDUSTRIAL AND PRODUCTION ENGINEERING, 2009, 26 (04) : 255 - 265
  • [30] Fast and secure elliptic curve scalar multiplication algorithm based on special addition chains
    Liu, Shuanggen
    Hu, Yupu
    Journal of Southeast University (English Edition), 2008, 24 (01) : 29 - 32