Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves

Poulami Das, Debapriya Basu Roy, Harishma Boyapally, Debdeep Mukhopadhyay
{"title":"Inner collisions in ECC: Vulnerabilities of complete addition formulas for NIST curves","authors":"Poulami Das, Debapriya Basu Roy, Harishma Boyapally, Debdeep Mukhopadhyay","doi":"10.1109/AsianHOST.2016.7835562","DOIUrl":null,"url":null,"abstract":"Elliptic curve cryptosystems are built on an underlying additive group, with an addition operation defined as the group operation. The aim of the elliptic curve addition operation is to render an elliptic curve point on the underlying elliptic curve when two ECC points are taken as inputs. However ECC addition formula may not be complete in nature, and may contain exceptional points, for which the addition formula may fail to produce a valid third point. The addition formula for prime order NIST curves were in fact not complete, till Renes et. al. proposed a complete addition formula for the class of prime order NIST curves in their Eurocrypt 2016 paper. The property of completeness ensures a valid third ECC point for any two chosen input points, and thus provides the advantage of using the same formula for both addition and doubling operations. Consequently it is assumed to be inherently side-channel secure, however any practical validation against side-channel protection is not yet present in the literature. In this work we analyse the side-channel protection for this newly constructed unified formula against two horizontal attacks. We show although this new construction is resistant against HCCA, it may be vulnerable to the ROSETTA attack, which exploits inner collisions within field multiplication operations.","PeriodicalId":394462,"journal":{"name":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsianHOST.2016.7835562","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Elliptic curve cryptosystems are built on an underlying additive group, with an addition operation defined as the group operation. The aim of the elliptic curve addition operation is to render an elliptic curve point on the underlying elliptic curve when two ECC points are taken as inputs. However ECC addition formula may not be complete in nature, and may contain exceptional points, for which the addition formula may fail to produce a valid third point. The addition formula for prime order NIST curves were in fact not complete, till Renes et. al. proposed a complete addition formula for the class of prime order NIST curves in their Eurocrypt 2016 paper. The property of completeness ensures a valid third ECC point for any two chosen input points, and thus provides the advantage of using the same formula for both addition and doubling operations. Consequently it is assumed to be inherently side-channel secure, however any practical validation against side-channel protection is not yet present in the literature. In this work we analyse the side-channel protection for this newly constructed unified formula against two horizontal attacks. We show although this new construction is resistant against HCCA, it may be vulnerable to the ROSETTA attack, which exploits inner collisions within field multiplication operations.
ECC中的内部碰撞:NIST曲线完全加法公式的漏洞
椭圆曲线密码系统建立在一个基础的可加群上,其加法运算定义为群运算。椭圆曲线加法运算的目的是当两个ECC点作为输入时,在底层的椭圆曲线上呈现一个椭圆曲线点。然而,ECC的加法公式在本质上可能是不完整的,并且可能包含异常点,对于这些异常点,加法公式可能无法产生有效的第三点。事实上,素数阶NIST曲线的加法公式并不完整,直到renees等人在其Eurocrypt 2016年的论文中提出了一类素数阶NIST曲线的完整加法公式。完备性确保了任意两个选择的输入点都有有效的第三个ECC点,从而提供了对加法和加倍操作使用相同公式的优势。因此,它被认为是固有的侧信道安全,然而,任何针对侧信道保护的实际验证尚未出现在文献中。在这项工作中,我们分析了这个新构建的统一公式对两个水平攻击的侧通道保护。我们表明,尽管这种新结构可以抵抗HCCA,但它可能容易受到ROSETTA攻击,该攻击利用了字段乘法操作中的内部碰撞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信