A novel elliptic curve scalar multiplication algorithm against power analysis (Q474700): Difference between revisions
From MaRDI portal
Added link to MaRDI item. |
Created claim: Wikidata QID (P12): Q59030767, #quickstatements; #temporary_batch_1706814575051 |
||
Property / Wikidata QID | |||
Property / Wikidata QID: Q59030767 / rank | |||
Normal rank |
Revision as of 20:15, 1 February 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | A novel elliptic curve scalar multiplication algorithm against power analysis |
scientific article |
Statements
A novel elliptic curve scalar multiplication algorithm against power analysis (English)
0 references
24 November 2014
0 references
Summary: Nowadays, power analysis attacks are becoming more and more sophisticated. Through power analysis attacks, an attacker can obtain sensitive data stored in smart cards or other embedded devices more efficiently than with any other kind of physical attacks. Among power analysis, simple power analysis (SPA) is probably the most effective against elliptic curve cryptosystem, because an attacker can easily distinguish between point addition and point doubling in a single execution of scalar multiplication. To make elliptic curve scalar multiplication secure against SPA attacks, many methods have been proposed using special point representations. In this paper, a simple but efficient SPA-resistant multiscalar multiplication is proposed. The method is to convert the scalar into a nonadjacent form (NAF) representation at first and then constitute it in a new signed digit representation. This new representation is undertaken at a small precomputation cost, as each representation needs just one doubling and 1/2 additions for each bit. In addition, when combined with randomization techniques, the proposed method can also guard against differential power analysis (DPA) attack.
0 references