首页> 外文会议>IMA International Conference on Cryptography and Coding >Efficient Counter-measures for Thwarting the SCA Attacks on the Frobenius Based Methods
【24h】

Efficient Counter-measures for Thwarting the SCA Attacks on the Frobenius Based Methods

机译:挫败基于Frobenius的方法的SCA攻击的高效反措施

获取原文

摘要

The Frobenius endomorphism r is known to be useful for efficient scalar multiplication on elliptic curves defined over a field with small characteristic (E(F_(q~m))). However, on devices with small resources, scalar multiplication algorithms using Frobenius are, as the usual double-and-add algorithms, vulnerable to Side Channel Attacks (SCA). The more successful countermeasure for thwarting the SCA attacks on the Frobenius-based τ—adic method seems to be the multiplier randomization technique introduced by Joye and Tymen. This technique increases the computational time by about 25%. In this paper, we propose two efficient counter-measures against SCA attacks, including the powerful RPA and ZPA attacks. First, we propose to adapt the Randomized Initial Point technique (RIP) to the τ — adic method for Koblitz curves with trace 1 by using a small precomputed table (only 3 points stored). We present also an efficient fixed base τ — adic method SCA-resistant based on the Lim and Lee technique. For this purpose we modify the τ — NAF representation of the secret scalar in order to obtain a new sequence of non-zero bit-strings. This, combined with the use of Randomized Linearly-transformed coordinates (RLC), will prevent the SCA attacks on the fixed base τ — adic method, including RPA and ZPA. Furthermore, our algorithm optimizes both the size of the precomputed table and the computation time. Indeed, we only store 2~(w-1) points instead of ((3~w-1)/2) for the fixed-base τ — adic method, with a more advantageous running time.
机译:已知Frobenius Endomorphism R可用于有效的标量乘法对具有小特征(E(Q〜M))的场上定义的椭圆曲线上的椭圆曲线。然而,在具有小资源的设备上,使用Frobenius的标量乘法算法作为通常的双和添加算法,容易受到侧信机攻击(SCA)。挫败基于Frobenius的τ-ADIC方法的SCA攻击越来越成功的对策似乎是Joye和Tymen引入的乘数随机化技术。该技术将计算时间提高约25%。在本文中,我们提出了对SCA攻击的两个有效的反措施,包括强大的RPA和ZPA攻击。首先,我们建议通过使用小型预先计算表(仅存储3个点)将随机初始点技术(RIP)调整到具有跟踪1的Koblitz曲线的τAdic方法。我们还提供了基于LIM和LEE技术的有效固定基础τ-ADIC方法SCA抗性。为此目的,我们修改静态标量的τ - NAF表示,以获得新的非零位字符串序列。这与使用随机线性变换的坐标(RLC)相结合,将防止SCA攻击固定基座τ-ADIC方法,包括RPA和ZPA。此外,我们的算法优化了预先计算的表的大小和计算时间。实际上,我们只存储2〜(W-1)点代替固定基础τ-ADIC方法的((3〜W-1)/ 2),具有更有利的运行时间。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号