Paper 2005/222
Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis
Min Feng, Bin B. Zhu, Maozhi Xu, and Shipeng Li
Abstract
Elliptic Curve Cryptography (ECC) has found wide applications in
smart cards and embedded systems. Point multiplication plays a
critical role in ECC. Many efficient point multiplication methods
have been proposed. One of them is the comb method which
is much more efficient than other methods if precomputation points
are calculated in advance or elsewhere. Unfortunately, Many
efficient point multiplication methods including the comb method are
vulnerable to power-analysis attacks. Various algorithms to make
elliptic curve point multiplication secure to power-analysis attacks
have been proposed recently, such as the double-and-add-always
method, Möller's window method, Okeya
et al.'s odd-only window method, and Hedabou et al.'s
comb method. In this paper, we first present a novel comb
recoding algorithm which converts an integer to a sequence of
signed, odd-only comb bit-columns. Using this recoding algorithm, we
then present several comb methods, both Simple Power Analysis
(SPA)-nonresistant and SPA-resistant, for point multiplication.
These comb methods are more efficient than the original
SPA-nonresistant comb method and Hedabou et al.'s SPA-resistant comb
method. Our comb methods inherit the advantage of a comb method,
running much faster than Möller's window method and Okeya et
al.'s odd-only window method, as well as other window methods such
as the efficient signed
Metadata
- Available format(s)
-
PDF PS
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- elliptic curve cryptosystemsmart cardscomb methodside channel attack
- Contact author(s)
- fengmin @ math pku edu cn
- History
- 2005-07-12: received
- Short URL
- https://ia.cr/2005/222
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2005/222, author = {Min Feng and Bin B. Zhu and Maozhi Xu and Shipeng Li}, title = {Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis}, howpublished = {Cryptology {ePrint} Archive, Paper 2005/222}, year = {2005}, url = {https://eprint.iacr.org/2005/222} }