Efficient countermeasures for thwarting the SCA attacks on the frobenius based methods

0Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Frobenius endomorphism τ is known to be useful for efficient scalar multiplication on elliptic curves defined over a field with small characteristic (E(double struck F signqm)). However, on devices with small resources, scalar multiplication algorithms using Frobenius are, as the usual double-and-add algorithms, vulnerable to Side Channel Attacks (SCA). The more successful countermeasure for thwarting the SCA attacks on the Frobenius-based τ- adic method seems to be the multiplier randomization technique introduced by Joye and Tymen. This technique increases the computational time by about 25%. In this paper, we propose two efficient countermeasures against SCA attacks, including the powerful RPA and ZPA attacks. First, we propose to adapt the Randomized Initial Point technique (RIP) to the τ - adic method for Koblitz curves with trace 1 by using a small precomputed table (only 3 points stored). We present also an efficient fixed base τ - adic method SCA-resistant based on the Lim and Lee technique. For this purpose we modify the τ - NAF representation of the secret scalar in order to obtain a new sequence of non-zero bit-strings. This, combined with the use of Randomized Linearly-transformed coordinates (RLC), will prevent the SCA attacks on the fixed base τ - adic method, including RPA and ZPA. Furthermore, our algorithm optimizes both the size of the precomputed table and the computation time. Indeed, we only store 2w-1 points instead of 3w - 1/2 for the fixed-base τ - adic method, with a more advantageous running time. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Hedabou, M. (2005). Efficient countermeasures for thwarting the SCA attacks on the frobenius based methods. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3796 LNCS, pp. 248–261). https://doi.org/10.1007/11586821_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free