2006
DOI: 10.1093/ietfec/e89-a.5.1362
|View full text |Cite
|
Sign up to set email alerts
|

Defeating Simple Power Analysis on Koblitz Curves

Abstract: Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very efficiently. For this reason, they are suitable candidates for implementations on low-end processors. However, such devices are often vulnerable to side channel attacks. In this paper, we propose a new countermeasure against side channel attacks on Koblitz curves, which utilizes a fixed-pattern recoding to defeat simple power analysis. We show that in practical cases, the recoding can be performed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(17 citation statements)
references
References 17 publications
(39 reference statements)
0
17
0
Order By: Relevance
“…ρ ideal X,Y = 1. The MPL method is considered as one of the SPAresistant algorithms in many papers [10,11,12]. However, a naïve hardware implementation of the algorithm becomes vulnerable to SPA attacks.…”
Section: Spa Attack For the Mpl Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…ρ ideal X,Y = 1. The MPL method is considered as one of the SPAresistant algorithms in many papers [10,11,12]. However, a naïve hardware implementation of the algorithm becomes vulnerable to SPA attacks.…”
Section: Spa Attack For the Mpl Methodsmentioning
confidence: 99%
“…2, the secret key cannot be identified by power trace easily. This is why much previous work report the MPL method is secure against SPA attacks [10,11,12]. However, the power trace still shows irregular shapes depending on the key bit.…”
mentioning
confidence: 99%
“…Signed bits are allowed for B for two reasons: (a) Koblitz curve cryptosystems are typically implemented by using the τ NAF) representation [24] or some other representation with signed bits (e.g., [22,27]) and (b) this allows computing subtractions with the same algorithm. Adding the two expansions gives the following expansion:…”
Section: Addition In the τ -Adic Domainmentioning
confidence: 99%
“…Figure 3 presents an architecture that implements Algorithm 1 for μ = 1. Because B i ∈ {−1, 0, 1}, it can be used for K given using signed-bit representations (e.g., [22,24,27]). Because t 0 ∈ [−3, 3] and A i + B i ∈ [−1, 2], r ∈ [−4, 5] and we need 4 bits to represent it.…”
Section: Architecturementioning
confidence: 99%
See 1 more Smart Citation