Unlock instant, AI-driven research and patent intelligence for your innovation.

Scalar Regular Naf Sequence Generation Method

A technology of rules and sequences, which is applied in the field of generating regular NAF sequences, can solve problems such as utilization and no obvious features, and achieve the effects of saving storage space, eliminating computing time, and saving time

Active Publication Date: 2019-11-12
SHANGHAI HUAHONG INTEGRATED CIRCUIT
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] An effective way to defend against SPA attacks is to generate regular Width-w NAF representations for scalar k. In this regular Width-w NAF sequence, non-zero bits must and will only be generated at specific positions in each w-bit sequence. Therefore, the position of the non-zero bit has no direct relationship with the value of the scalar k itself, and there is no obvious feature on the power consumption curve of the scalar multiplication that can be used by SPA

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scalar Regular Naf Sequence Generation Method
  • Scalar Regular Naf Sequence Generation Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Scalar multiplication is the most important and time-consuming operation of ECC. Attacks on ECC are mainly focused on attacks on scalar multiplication operations. Fast and safe implementation of scalar multiplication has always been the direction of the industry's efforts. The generation method of the regular NAF sequence of the scalar is a safe and fast specific implementation method related to the scalar multiplication in the elliptic curve cryptography.

[0028] In order to improve the execution speed of scalar multiplication and resist SPA attacks, at present, the scalar multiplication operation is mainly performed after the signed regular transformation is performed on the scalar quantity, so that what can be seen on the power consumption curve is the emergence of point addition and point doubling operation rules , there will be no leakage of SPA information, and the selection of the window size can also reduce the number of point addition operations and effectively...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a generation method for a regular NAF sequence of a scalar. The method includes steps of choosing a window size w of the regular NAF sequence according to demands and listing formats of the regular NAF sequence in the corresponding window size; listing all possible results of a non-zero item and re-encoding the results to a continuous positive integer set according to a size sequence; recording the parity according to the lowest order of the scalar k and adjusting the lowest order so as to obtain an odd k', if k[0]=1, k'=k, or, k'=k+1; dividing k' into groups from the lowest order to the highest order, each group containing w orders and finding the non-zero group with the highest order and adding 1 in front of the highest order, moving the new k' from the high order to the low order and removing the lowest order. Therefore, the regular NAF sequence, subjected to re-encoding and with no 0 in a prior regular NAF sequence remained, with the window size of w, is obtained. The method saves calculation time and saves storage space.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for generating a scalar regular NAF (non-adjacent expression type) sequence. Background technique [0002] Elliptic curve cryptography (ECC) has the characteristics of high security, small amount of calculation, fast processing speed, small storage space, and low bandwidth requirements. Compared with the RSA public key system, ECC is very suitable for embedded mobile environments with limited resources, such as cryptographic chips on smart cards. Traditionally, the attack on cryptographic chips is mainly to analyze the implemented algorithm from a mathematical point of view, such as differential analysis and linear analysis. However, since Side Channel Attacks (Side Channel Attacks) was proposed, more and more people began to pay attention to the implementation of the chip and the anti-attack measures taken against the attacks faced by the chip. Side-channel attack ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00
CPCH04L9/003
Inventor 徐云秀顾海华
Owner SHANGHAI HUAHONG INTEGRATED CIRCUIT