H. Meshgi, Mohammad Erfan Khazaee, B. Kasiri, H. Shahhoseini
{"title":"An efficient algorithm resistant to SPA and DPA variants in ECC","authors":"H. Meshgi, Mohammad Erfan Khazaee, B. Kasiri, H. Shahhoseini","doi":"10.1109/WD.2008.4812882","DOIUrl":null,"url":null,"abstract":"Power analysis is a dominant method that reveals side channel information by tracing power signal. In elliptic curve cryptosystem (ECC), they have received considerable attention. The main operation of ECC is scalar multiplication which is vulnerable to power analysis attacks. In this paper we present an algorithm for securing elliptic curve scalar multiplication against Power Analysis. However some algorithms, which are resistant against some kinds of power analysis attacks like Simple Power Analysis (SPA) or Differential Power Analysis (DPA), were developed, we contribute an algorithm that is resistant against the most recent kinds of power analysis attacks. Also, our algorithm can be successful for a large class of elliptic curves, including most of the elliptic curves recommended by standard bodies such as ANSI, IEEE, ISO, NIST, SECG or WTLS.","PeriodicalId":247938,"journal":{"name":"2008 1st IFIP Wireless Days","volume":"36 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 1st IFIP Wireless Days","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WD.2008.4812882","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Power analysis is a dominant method that reveals side channel information by tracing power signal. In elliptic curve cryptosystem (ECC), they have received considerable attention. The main operation of ECC is scalar multiplication which is vulnerable to power analysis attacks. In this paper we present an algorithm for securing elliptic curve scalar multiplication against Power Analysis. However some algorithms, which are resistant against some kinds of power analysis attacks like Simple Power Analysis (SPA) or Differential Power Analysis (DPA), were developed, we contribute an algorithm that is resistant against the most recent kinds of power analysis attacks. Also, our algorithm can be successful for a large class of elliptic curves, including most of the elliptic curves recommended by standard bodies such as ANSI, IEEE, ISO, NIST, SECG or WTLS.