首页> 外文会议>IMA International Conference on Cryptography and Coding; 20051219-21; Cirencester(GB) >Efficient Counter-measures for Thwarting the SCA Attacks on the Frobenius Based Methods
【24h】

Efficient Counter-measures for Thwarting the SCA Attacks on the Frobenius Based Methods

机译:在基于Frobenius的方法上阻止SCA攻击的有效对策

获取原文
获取原文并翻译 | 示例

摘要

The Frobenius endomorphism r is known to be useful for efficient scalar multiplication on elliptic curves defined over a field with small characteristic (E(F_(q~m))). However, on devices with small resources, scalar multiplication algorithms using Frobenius are, as the usual double-and-add algorithms, vulnerable to Side Channel Attacks (SCA). The more successful countermeasure for thwarting the SCA attacks on the Frobenius-based τ—adic method seems to be the multiplier randomization technique introduced by Joye and Tymen. This technique increases the computational time by about 25%. In this paper, we propose two efficient counter-measures against SCA attacks, including the powerful RPA and ZPA attacks. First, we propose to adapt the Randomized Initial Point technique (RIP) to the τ — adic method for Koblitz curves with trace 1 by using a small precomputed table (only 3 points stored). We present also an efficient fixed base τ — adic method SCA-resistant based on the Lim and Lee technique. For this purpose we modify the τ — NAF representation of the secret scalar in order to obtain a new sequence of non-zero bit-strings. This, combined with the use of Randomized Linearly-transformed coordinates (RLC), will prevent the SCA attacks on the fixed base τ — adic method, including RPA and ZPA. Furthermore, our algorithm optimizes both the size of the precomputed table and the computation time. Indeed, we only store 2~(w-1) points instead of ((3~w-1)/2) for the fixed-base τ — adic method, with a more advantageous running time.
机译:已知Frobenius同态r对于在具有较小特征(E(F_(q〜m)))的场上定义的椭圆曲线上的有效标量乘法很有用。但是,在资源较少的设备上,使用Frobenius的标量乘法算法作为常见的“双加”算法,很容易受到边信道攻击(SCA)的影响。阻止基于Frobenius的τadic方法的SCA攻击的更成功的对策似乎是Joye和Tymen引入的乘数随机化技术。此技术将计算时间增加了约25%。在本文中,我们提出了两种针对SCA攻击的有效对策,包括强大的RPA和ZPA攻击。首先,我们建议通过使用一个小的预计算表(仅存储3个点),将随机初始点技术(RIP)适配于轨迹1的Koblitz曲线的τ-adic方法。我们还提出了一种基于Lim和Lee技术的高效固定基τ-adic方法,可抵抗SCA。为此,我们修改了秘密标量的τ-NAF表示,以获得新的非零位字符串序列。这与随机线性变换坐标(RLC)的使用相结合,将防止SCA对固定基础τadic方法(包括RPA和ZPA)的攻击。此外,我们的算法会优化预计算表的大小和计算时间。实际上,对于固定基数τadic方法,我们仅存储2〜(w-1)个点而不是((3〜w-1)/ 2),具有更有利的运行时间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号