Enhanced Elliptic Curve Scalar Multiplication Secure Against Side Channel Attacks and Safe Errors

被引:7
|
作者
Dubeuf, Jeremy [1 ]
Hely, David [2 ]
Beroulle, Vincent [2 ]
机构
[1] Maxim Integrated, Secur Excellence Lab, San Jose, CA 95134 USA
[2] Univ Grenoble Alpes, LCIS, Grenoble, France
关键词
Elliptic curve cryptography; Point multiplication algorithms; Security issues; Forced bit; Safe-error; Dummy operands; Smartcard; POWER-ANALYSIS; EFFICIENT COUNTERMEASURES;
D O I
10.1007/978-3-319-64647-3_5
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic curve cryptography (ECC) is involved in many secure schemes. Such schemes involve the elliptic curve scalar operation which is particularly security sensitive. Many algorithms of this operation have been proposed including security countermeasures. This paper discusses the security issues of such algorithms when running on a device that can be physically accessed. Leveraging these issues, new simple attack schemes to recover scalar bit information are presented and a new detailed attack based on C safe-error, probability and lattice is described against an Elliptic Curve Digital Signature Algorithm (ECDSA) using the Montgomery ladder algorithm. This new attack shows that Montgomery ladder can be sensitive to C safe-errors under some conditions. Finally, new secure elliptic curve scalar operation algorithms are presented with solutions to the discussed issues and guidance for their secure implementations.
引用
收藏
页码:65 / 82
页数:18
相关论文
共 50 条
  • [31] Hard problems in elliptic curve scalar multiplication
    Vijayarangan, Natarajan
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2010, 13 (05): : 445 - 452
  • [32] Elliptic Curve Scalar Multiplication with a Bijective Transform
    Nagai, Yoshitaka
    Shirase, Masaaki
    Izu, Tetsuya
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 280 - 286
  • [33] Improved elliptic curve scalar multiplication algorithm
    Karthikeyan, E.
    Balasubramaniam, P.
    2006 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2007, : 254 - +
  • [34] Atomicity Improvement for Elliptic Curve Scalar Multiplication
    Giraud, Christophe
    Verneuil, Vincent
    SMART CARD RESEARCH AND ADVANCED APPLICATION, PROCEEDINGS, 2010, 6035 : 80 - +
  • [35] Parallel scalar multiplication for elliptic curve cryptosystems
    Ansari, B
    Wu, HP
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 71 - 73
  • [36] Overview of Scalar Multiplication in Elliptic Curve Cryptography
    Li, Ye
    Feng, Liu
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2670 - 2673
  • [37] Elliptic Curve Scalar Multiplication Algorithm Based on Side Channel Atomic Block over GF(2m)
    Liu, Shuang Gen
    Hu, Yan Yan
    Wei, Lan
    International Journal of Network Security, 2021, 23 (06) : 1005 - 1011
  • [38] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [39] Study of side-channel attacks for elliptic curve cryptosystem algorithm
    Liu, Shuanggen
    Hu, Yupu
    Xu, Wensheng
    Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/Journal of Wuhan University of Technology (Transportation Science and Engineering), 2007, 31 (03): : 491 - 493
  • [40] Randomized Windows for Secure Scalar Multiplication on Elliptic Curves
    Pontie, Simon
    Maistri, Paolo
    PROCEEDINGS OF THE 2014 IEEE 25TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP 2014), 2014, : 78 - +