2002
DOI: 10.1007/3-540-36288-6_15
|View full text |Cite
|
Sign up to set email alerts
|

A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems

Abstract: As Elliptic Curve Cryptosystems are becoming more and more popular and are included in many standards, an increasing demand has appeared for secure implementations that are not vulnerable to sidechannel attacks. To achieve this goal, several generic countermeasures against Power Analysis have been proposed in recent years. In particular, to protect the basic scalar multiplication-on an elliptic curve-against Differential Power Analysis (DPA), it has often been recommended using "random projective coordinates",… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
94
0
2

Year Published

2003
2003
2016
2016

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 146 publications
(96 citation statements)
references
References 23 publications
0
94
0
2
Order By: Relevance
“…They include randomizing the secret scalar, blinding the point and using randomized projective coordinates. New directions for attacking these countermeasures have recently been proposed [5,6] but none of them works when all protections proposed by Coron are applied An alternative to Coron's countermeasures is to randomize the multiplication algorithm itself by introducing some random decisions. Two recent propositions [7,20] use a randomized addition-subtraction chain, which is equivalent to represent the scalar with the alternative set of digits {0, 1, −1}.…”
Section: Countermeasures Using a Randomized Scalar Representationmentioning
confidence: 99%
“…They include randomizing the secret scalar, blinding the point and using randomized projective coordinates. New directions for attacking these countermeasures have recently been proposed [5,6] but none of them works when all protections proposed by Coron are applied An alternative to Coron's countermeasures is to randomize the multiplication algorithm itself by introducing some random decisions. Two recent propositions [7,20] use a randomized addition-subtraction chain, which is equivalent to represent the scalar with the alternative set of digits {0, 1, −1}.…”
Section: Countermeasures Using a Randomized Scalar Representationmentioning
confidence: 99%
“…In particular, this is the case for RSA as the factorization of the modulus and the public exponent are rarely available to the device. Note that our countermeasure also fully applies to the ECC setting since the randomization of projective coordinates, introduced by Coron in [5], was later proven insufficiant by Goubin in [6]. As pointed out recently by Dupuy and Kuntz-Jacques [7], when the attacker can tamper with the base element, scalar point multiplications also require randomization of the computation flow to provide DPA resistance.…”
Section: Introductionmentioning
confidence: 91%
“…Our attack seems to be Goubin's Refined Power-analysis Attack [6], but ours uses the discriminative method that compares two waveforms (The method is introduced in Section 4). Also, while Goubin's attack can use only "special point" with zero coordinate, our attack has a merit that can use almost every points over elliptic curve.…”
Section: Initializing Attackmentioning
confidence: 99%