Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves (Q1616162)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves |
scientific article |
Statements
Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves (English)
0 references
1 November 2018
0 references
Elliptic curve cryptosystems are vulnerable under a particular type of side-channel attack (SCA), the so-called zero-value point (ZVP) attacks (if the underline elliptic curve \(E: y^2=x^3+ax+b\),\, defined over a finite field, fulfill some conditions this attack allows to obtain the secret key), see [\textit{T. Akishita} and \textit{T. Takagi}, Lect. Notes Comput. Sci. 2851, 218--233 (2003; Zbl 1255.94052)]. \textit{C. Murdica} et al. [Lect. Notes Comput. Sci. 7275, 183--198 (2012)] added more conditions to the elliptic curve \(E\)\, to be SCA-resistent (same-value analysis (SVA) attaks). To overcome those weakness \textit{N. P. Smart} [``Same values power analysis using special points on elliptic curves'', Lect. Notes Comput. Sci. 2779, 281--290 (2003; Zbl 1274.94116)] proposed to use instead of \(E\)\, another curve \(l\)-isogenous (\(l\)\, prime) to \(E\),\, curve not fulfilling the conditions of Akishita and Takagi. \textit{J. M. Miret} et al. [Lect. Notes Comput. Sci. 5379, 266--277 (2009; Zbl 1292.94114)] proposed to take instead of a unique \(l\)-isogeny a chain of isogenies (of small degree), working in the volcanoes of \(E\). The present paper follows these paths looking for alternative curves, resistant to SCA and efficient (\(a=-3\)), for two sets of curves: the curves recommended by the NIST [FIPS PUB 186--4, Appendix D. (2013), \url{http://csrc.nist.gov/ publications/PubsFIPS.html}] and the proposed by J.W. Bos et al. [``Selecting elliptic curves for cryptography: an efficiency and security analysis'', J. Cryptogr. Eng. 6, No. 4, 259--286 (2016)]. Sections 2 and 3 summarizes the basic facts about elliptic curves and SCA, in particular ZVP and SVA attacks. The proposed analysis is presented in Section 5. First it proves that all the curves of both sets are vulnerable (Tables 1 and 2) and then it looks for sure and efficient alternative curves (Algorithm 1). Algorithm 1 is a variant of an algorithm due to \textit{R. Abarzúa} et al. [``Evitando ataques Side-Channel mediante el cálculo de curvas isógenas e isomorfas'', in: Proceedings of VII CIBSI, 173--180, Panamá (2013)]. Given an elliptic curve \(E\)\, and using isogenies and isomorphisms the algorithm looks for a resistant and efficient curve. But ``If, after several tries, the algorithm is unable to find a resistant efficient curve (with \(a = -3\)), then it computes a resistant curve \dots without forcing the efficiency restriction.'' Appendices A. and B. show the founded curves.
0 references
elliptic curve cryptography
0 references
smart cards
0 references
side-channel attacks
0 references
zero-value point attacks
0 references
isogenies
0 references