Abstract
Power Analysis attacks on elliptic curve cryptosystems and various countermeasures against them, have been first discussed by Coron ([6]). All proposed countermeasures are based on the randomization or blinding of the inputparameters of the binary algorithm. We propose a countermeasure that randomizes the binary algorithm itself. Our algorithm needs approximately 9% more additions than the ordinary binary algorithm, but makes power analysis attacks really difficult.
Chapter PDF
Similar content being viewed by others
References
E. Biham, A. Shamir, Power Analysis of the Key Scheduling of the AES Candidates Second AES Candidate Conference, Rome, March 1999, pp 115–121.
S. Chari, Ch. Jutla, J. Rao, P. Rohatgi.A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards. Second AES Candidate Conference, Rome, March 22–23, 1999, pp 133–147.
S. Chari, Ch. Jutla, J. Rao, P. Rohatgi. Towards Sound Approaches to Counteract Power-Analysis Attacks, Proceedings of Advances in Cryptology-CRYPTO’99, Lecture Notes in Computer Science, vol. 1666, Springer, 1999, pp. 398–412
C. Clavier, J.-S. Coron, N. Dabbous, Differential Power Analysis in the presence of Hardware Countermeasures, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer, 2000, pp. 252–263
I. Blake, G. Seroussi, N. Smart, Elliptic Curves in Cryptography, London Mathematical Society, Lecture Notes Series 265, Cambridge Universtiy Press
J.-S. Coron, Resistance against differential power analysis for elliptic curve cryp-tosystems, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 1999), Lecture Notes in Computer Science, vol. 1717, Springer, 1999, pp. 292–302
J.-S. Coron, L. Goubin, On Boolean and Arithmetic Masking against Differential Power Analysis, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer, 2000, pp. 231–237
J.-S. Coron, P. Kocher, D. Naccache, Statistics and Secret Leackage, to appear in Proceedings of Financial Cryptography, Springer-Verlag, February 2000
P. Fahn, P. Pearson. IPA: A New Class of Power Attacks, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 199), Lecture Notes in Computer Science, vol. 1717, Springer 1999
D. M. Gordon, A survey of fast exponentiation methods., J. Algorithms, 27, pp. 129–146, 1998
L. Goubin, J. Patarin. DES and Differential Power Analysis. Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 199), Lecture Notes in Computer Science, vol. 1717, Springer 1999, pp 158–172.
M. A. Hasan, Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Cryptosystems, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer 2000, pp. 93–108
K.F. Ireland, M. Rosen, A Classical Introduction to Modern Number Theory, Graduate Texts in Mathematics, vol. 84, Springer-Verlag, Fifth printing, 1998
D. E. Knuth. Seminumerical algorithms. The Art of Computer Programming. T. II, Addison-Wesley.
N. Koblitz. Elliptic Curve Cryptosystems, Mathematics of Computation, vol. 48, 1987, pp. 203–209
P. Kocher, J. Jaffe and B. Jun, Differential Power Analysis, Proceedings of Advances in Cryptology-CRYPTO’99, Springer 1999, pp. 388–397
R. Mayer-Sommer, Smartly Analyzing the Simplicity and the Power of Simple Power Analysis on Smartcards, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer 2000, pp. 78–92
A. J. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, 1993
T.S. Messerges, E. A. Dabbish and R. H. Sloan, Investigations of Power Analysis Attacks on Smartcards, Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151–61.
T.S. Messerges, E. A. Dabbish and R. H. Sloan, Power Analysis Attacks of Modular Exponentiation in Smartcards, Workshop on Cryptographic Hardware and Embedded Systems, Lecture Notes in Computer Science, vol. 1717, Springer 1999.
T. S. Messerges, Using Second-Order Power Analysis to Attack DPA Resistant Software, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer 2000, pp. 238–251
A. Shamir, Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies, Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2000), Lecture Notes in Computer Science, vol. 1965, Springer 2000, pp. 71–77
F. Morain, J. Olivos. Speeding up the computation on an elliptic curve using addition-subtraction chains, Inform. Theory Appl. 24 (1990), 531–543.
V. S. Miller. Use of Elliptic Curves in Cryptography, Proceedings of Crypto 85, Lecture Notes in Computer Science 218, Springer, 1986, pp. 417–426
N. Weste and K. Eshraghian, Principles of CMOS VLSI Design, Addison-Wesley Publishing Company, 1993.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Oswald, E., Aigner, M. (2001). Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. In: Koç, Ç.K., Naccache, D., Paar, C. (eds) Cryptographic Hardware and Embedded Systems — CHES 2001. CHES 2001. Lecture Notes in Computer Science, vol 2162. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44709-1_5
Download citation
DOI: https://doi.org/10.1007/3-540-44709-1_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42521-2
Online ISBN: 978-3-540-44709-2
eBook Packages: Springer Book Archive