A novel elliptic curve scalar multiplication algorithm against power analysis (Q474700): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: author (P16): Item:Q1707365
RedirectionBot (talk | contribs)
Changed an Item
Property / author
 
Property / author: Yu Jie Zhou / rank
 
Normal rank

Revision as of 14:24, 29 February 2024

scientific article
Language Label Description Also known as
English
A novel elliptic curve scalar multiplication algorithm against power analysis
scientific article

    Statements

    A novel elliptic curve scalar multiplication algorithm against power analysis (English)
    0 references
    0 references
    0 references
    0 references
    24 November 2014
    0 references
    Summary: Nowadays, power analysis attacks are becoming more and more sophisticated. Through power analysis attacks, an attacker can obtain sensitive data stored in smart cards or other embedded devices more efficiently than with any other kind of physical attacks. Among power analysis, simple power analysis (SPA) is probably the most effective against elliptic curve cryptosystem, because an attacker can easily distinguish between point addition and point doubling in a single execution of scalar multiplication. To make elliptic curve scalar multiplication secure against SPA attacks, many methods have been proposed using special point representations. In this paper, a simple but efficient SPA-resistant multiscalar multiplication is proposed. The method is to convert the scalar into a nonadjacent form (NAF) representation at first and then constitute it in a new signed digit representation. This new representation is undertaken at a small precomputation cost, as each representation needs just one doubling and 1/2 additions for each bit. In addition, when combined with randomization techniques, the proposed method can also guard against differential power analysis (DPA) attack.
    0 references

    Identifiers