Paper 2013/764

Dynamic Countermeasure Against the Zero Power Analysis

Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvorst, Cédric Murdica, and David Naccache

Abstract

Elliptic Curve Cryptography can be vulnerable to Side-Channel Attacks, such as the Zero Power Analysis (ZPA). This attack takes advantage of the occurrence of special points that bring a zero-value when computing a doubling or an addition of points. This paper consists in analysing this attack. Some properties of the said special points are explicited. A novel dynamic countermeasure is described. The elliptic curve formul\ae{} are updated depending on the elliptic curve and the provided base point.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
Elliptic Curve CryptographySide-Channel AnalysisZero Power AnalysisZero-Value PointsDynamic CountermeasureJacobi Symbol.
Contact author(s)
cedric murdica @ gmail com
History
2013-11-21: received
Short URL
https://ia.cr/2013/764
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2013/764,
      author = {Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache},
      title = {Dynamic Countermeasure Against the Zero Power Analysis},
      howpublished = {Cryptology ePrint Archive, Paper 2013/764},
      year = {2013},
      note = {\url{https://eprint.iacr.org/2013/764}},
      url = {https://eprint.iacr.org/2013/764}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.