Back to Search Start Over

Efficient and Secure Implementation of Elliptic Curve Scalar Multiplication Against Power Analysis Attacks

Authors :
T. Sudhakar
A. Kannathal
V. Natarajan
Source :
ICIA
Publication Year :
2016
Publisher :
ACM, 2016.

Abstract

The Elliptic Curve Cryptosystems(ECC) are proved to be the cryptosystem of future generation because of its smaller key size and uncompromised security. It is well suited for applications running in resource-restricted devices such as smart cards. At present, there is no efficient algorithm or known sub-exponential algorithm to break ECC theoretically. However, a hardware implementation of ECC leaks secret key information due to power analysis attacks particularly differential power analysis attack(DPA). These attacks break the system with far less effort when compared to all other attacks based on algebraic weaknesses of the algorithms. There are many solutions to overcome the power analysis attack, but all the available solutions have their own advantages and disadvantages by compromising either its security or performance. In this paper, we present a secure and efficient algorithm to solve the elliptic curve scalar multiplication(ECSM) using initial points randomization and by delaying the point addition operation. The implementation results and performance analysis shows that the proposed algorithm is efficient and secure against power analysis attacks.

Details

Database :
OpenAIRE
Journal :
Proceedings of the International Conference on Informatics and Analytics
Accession number :
edsair.doi...........e075405aeda769f1875290052c7e0b36
Full Text :
https://doi.org/10.1145/2980258.2980407