Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Realization method of elliptic curve cryptosystem for preventing side-channel attack

An elliptic curve cryptography and side-channel attack technology, applied in the field of cryptographic algorithms, can solve the problem that the attacker can no longer distinguish the point addition and the double point.

Inactive Publication Date: 2009-10-21
SHENZHEN INST OF ADVANCED TECH
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] In view of this, it is necessary to address the problem that ECC is easily attacked based on the difference in power consumption between point addition and point multiplication, and to provide an elliptic curve cryptosystem implementation method that is resistant to side channel attacks, so that attackers can no longer distinguish between point addition and point addition. The area where the doubling operation is located, so as to protect the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method of elliptic curve cryptosystem for preventing side-channel attack
  • Realization method of elliptic curve cryptosystem for preventing side-channel attack
  • Realization method of elliptic curve cryptosystem for preventing side-channel attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Taking the ECC on the prime number field under the projected coordinates in the international public key cryptography standard IEEE Std 1363-2000 as an example, the implementation method of the elliptic curve cryptosystem against side channel attack described in the present invention is further described.

[0050] like figure 1 As shown, the data transfer (DT), modular addition (MA), modular subtraction (MS), modular half (MH), modular multiplication (MM), and modular inversion (MI) are represented by different modules, namely figure 1 (a) means data transfer (DT), figure 1 (b) represents modulus addition (MA) and modulus subtraction (MS), figure 1 (c) represents the modular half (MH), figure 1 (d) means modular multiplication (MM) and figure 1 (e) represents the modular inverse (MI). And because some conditional judgment operations are unavoidably required in the calculation process, here you can use figure 1 The (f) block represents this operation.

[0051] Acco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an elliptic curve cryptosystem (Elliptic Curve Cryptosystem, called ECC for short) for preventing side-channel attack (Side-Channel Attacks, called SCA for short), which belongs to the field of cryptographic algorithm. The realization method of the elliptic curve cryptosystem for preventing side-channel attack comprises the following steps: the operational step of dot multiplication is determined by a cryptographic key during the processes of encryption and decryption, and the dot multiplication step is finished through the operational combination of point addition and point double with balanced operational flow. By balancing the operational flow of the point addition and the point double, the operation time of the two are the same, and the consumed power is also the same, therefore, the difference of the side channel information leaked from the point addition and the point double is eliminated, and the side-channel attach method based on the difference of the point addition and the point double is failed to attack the ECC during the entire dot multiplication process.

Description

【Technical field】 [0001] The invention relates to a cryptographic algorithm, in particular to a realization method of an elliptic curve cryptosystem resistant to side channel attacks. 【Background technique】 [0002] Cryptography devices, such as smart cards, have been more and more widely used. Because the objects it protects have strong privacy, their security has always been concerned. Elliptic Curve Cryptosystem (ECC) is a cryptographic protocol that is widely used in cryptographic devices. It has strong mathematical security, but when implemented on cryptographic devices, it will face more attack method. Among the various attack methods, using some side channel information leaked by cryptographic equipment to break these cryptosystems is the most threatening attack method, and this kind of attack is generally called Side-Channel Attacks (SCA for short). . [0003] Power consumption is an important side-channel information for cryptographic devices, because the calcula...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30
Inventor 陈廷定李慧云邬可可
Owner SHENZHEN INST OF ADVANCED TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products