Error-free protection of EC point multiplication by modular extension
نویسنده
چکیده
An implementation of a point multiplication function in an ellipticcurve cryptosystem can be attacked by fault injections in order to reveal the secret multiplier. A special kind of such an attack is the sign-change fault attack. Here the result of a point multiplication is changed in such a way that it is still a point on the curve. A well-known countermeasure against this kind of attack is to perform the point multiplication on a modular extension of the main curve by a small curve. Then the result is checked against the result of the same point multiplication recalculated on the small curve. The problem with this countermeasure is that the point at infinity on the small curve may be reached as an intermediate result with a non-negligible probability. In this case the comparison with the result on the small curve is either faulty or meaningless. We propose a variant of the modular extension countermeasure where the point at infinity is never reached as an intermediate result on the main or on the small curve.
منابع مشابه
Hardware Implementation of an Elliptic Curve Processor over GF(p)
This paper describes a hardware implementation of an arithmetic processor which is efficient for bit-lengths suitable for both commonly used types of Public Key Cryptography (PKC), i.e., Elliptic Curve (EC) and RSA Cryptosystems. Montgomery modular multiplication in a systolic array architecture is used for modular multiplication. The processor consists of special operational blocks for Montgom...
متن کاملUsing Modular Extension to Provably Protect ECC Against Fault Attacks
Fault injection attacks are a real-world threat to cryptosystems, in particular asymmetric cryptography. In this paper, we focus on countermeasures which guarantee the integrity of the computation result, hence covering most existing and future faults attacks. Namely, we study the modular extension protection scheme in previously existing and newly contributed variants of the countermeasure on ...
متن کاملVHDL Implementation using Elliptic Curve Point Multiplication
This paper describes synthesizable VDHL implementation of elliptic curve Point Multiplication. Elliptic curves used for ECC are defined over mathematical structures called Galois fields. Based on the theory of ECC, this paper has carried out Modular addition/subtraction, EC Point doubling/addition, Modular multiplicative inversion, EC point multiplier, projective to affine coordinates conversio...
متن کاملSHORT-SS4: Error-Free Transformation of Matrix Multiplication by A Posteriori Verification
This paper is concerned with accurate computations for matrix multiplication. An error-free transformation of matrix multiplication is developed by the authors. It transforms a product of two floatingpoint matrices to a sum of several floating-point matrices by using only floating-point arithmetic. This transformation is useful not only for accurate matrix multiplication but also for interval e...
متن کاملCox-Rower Architecture for Fast Parallel Montgomery Multiplication
This paper proposes a fast parallel Montgomery multiplication algorithm based on Residue Number Systems (RNS). It is easy to construct a fast modular exponentiation by applying the algorithm repeatedly. To realize an efficient RNS Montgomery multiplication, the main contribution of this paper is to provide a new RNS base extension algorithm. Cox-Rower Architecture described in this paper is a h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017