Cryptology ePrint Archive: Report 2004/342

A comb method to render ECC resistant against Side Channel Attacks

Mustapha Hedabou and Pierre Pinel and Lucien Bénéteau

Abstract: Side Channel Attacks may exploit leakage information to break cryptosystems on smard card devices. In this paper we present a new SCA-resistant elliptic curve scalar multiplication algorithm, based on the Lim and Lee technique. The proposed algorithm builds a sequence of bit-strings representing the scalar $k$, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behaviour for the algorithm, and thus will make it secure against SPA (Simple Power Analysis) attacks. The use of a recently introduced randomization technique achieves the security of the proposed scheme against other SCA attacks. Furthermore, the proposed countermeasures do not penalize the computation time

Category / Keywords: implementation / ECC, SCA attacks, scalar multiplication

Publication Info: paper submitted only to the Cryptology ePrint Archive.

Date: received 2 Dec 2004

Contact author: hedabou at insa-toulouse fr

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Version: 20041207:053709 (All versions of this report)

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]