Abstract | ||
---|---|---|
Elliptic curves offer interesting possibilities for alternative cryptosystems, especially in constrained environments like smartcards. However, cryptographic routines running on such lightweight devices can be attacked with the help of "side channel information"; power consumption, for instance. Elliptic curve cryptosystems are not an exception: if no precaution is taken, power traces can help attackers to reveal secret information stored in tamper-resistant devices. Okeya-Takagi scheme (OT scheme) is an efficient countermeasure against such attacks on elliptic curve cryptosystems, which has the unique feature to allow any size for the precomputed table: depending on how much memory is available, users can flexibly change the table size to fit their needs. Since the nature of OT scheme is different from other side-channel attack countermeasures, it is necessary to deeply investigate its security. In this paper, we present a comprehensive security analysis of OT scheme, and show that based on information leaked by power consumption traces, attackers can slightly enhance standard attacks. Then, we explain how to prevent such information leakage with simple and efficient modifications. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1093/ietfec/e89-a.1.161 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES |
Keywords | Field | DocType |
elliptic curve cryptosystems, smartcard, fractional window, side channel attacks, flexibility, discrete logarithm problem | Information leakage,Cryptography,Computer security,Smart card,Cryptosystem,Security analysis,Side channel attack,Mathematics,Elliptic curve,Discrete logarithm | Journal |
Volume | Issue | ISSN |
E89A | 1 | 0916-8508 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Katsuyuki Okeya | 1 | 447 | 38.47 |
Tsuyoshi Takagi | 2 | 1086 | 110.32 |
Camille Vuillaume | 3 | 90 | 10.61 |