Presentation 2006-03-17
Efficient DPA-and-SPA Secure Scalar Elliptic Curve Multiplication with Pre-computed Tables
Takeshi KIYOMIYA, Atsuko MIYAJI, Kenji MIZOSOE,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Elliptic curve cryptosystem can implement short key length in comparison with RSA cryptosystem briefly in small memory. It is used by IC cards. In particular, on implementation with IC cards, side channel attack to become a menace. Therefore we must consider countermeasures. One method of Data-bit DPA (DDPA) countermeasures do randomisation of bit expression of a secret scalar. By existing countermeasures method, it use a random number for binary strings and make bit expression different expression in scalar multiplications. We proposed window methods which using a random number, and it is randomisation by bit expression of a secret scalar for DDPA countermeasures. In proposed schemes, by giving choice of conversion for Obit, it make more secure than existing countermeasures. In addition, Address-bit DPA measures make more secure of Randomized Data method and applied to window method.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Elliptic curve cryptosystem / Side-channel Attack / Address-bit DPA / Data-bit DPA / Window method
Paper # IT2005-116,ISEC2005-173,WBS2005-130
Date of Issue

Conference Information
Committee IT
Conference Date 2006/3/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Theory (IT)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Efficient DPA-and-SPA Secure Scalar Elliptic Curve Multiplication with Pre-computed Tables
Sub Title (in English)
Keyword(1) Elliptic curve cryptosystem
Keyword(2) Side-channel Attack
Keyword(3) Address-bit DPA
Keyword(4) Data-bit DPA
Keyword(5) Window method
1st Author's Name Takeshi KIYOMIYA
1st Author's Affiliation School of Information Science, Japan Advanced Institute of Science and Technology (JAIST)()
2nd Author's Name Atsuko MIYAJI
2nd Author's Affiliation School of Information Science, Japan Advanced Institute of Science and Technology (JAIST)
3rd Author's Name Kenji MIZOSOE
3rd Author's Affiliation School of Information Science, Japan Advanced Institute of Science and Technology (JAIST)
Date 2006-03-17
Paper # IT2005-116,ISEC2005-173,WBS2005-130
Volume (vol) vol.105
Number (no) 662
Page pp.pp.-
#Pages 6
Date of Issue