How to prevent DPA and fault attack in a unified way for ECC scalar multiplication: ring extension method

  • Authors:
  • Yoo-Jin Baek;Ihor Vasyltsov

  • Affiliations:
  • Embedded SW Center, Samsung Electronics, Korea;Embedded SW Center, Samsung Electronics, Korea

  • Venue:
  • ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The elliptic curve cryptosystem(ECC) is increasingly being used in practice due to its shorter key sizes and efficient realizations. However, ECC is also known to be vulnerable to various side channel attacks, including power attacks and fault injection attacks. This paper proposes new countermeasures for ECC scalar multiplications against differential power attacks and fault attacks. The basic idea of proposed countermeasures lies in extending the definition field of an elliptic curve to its random extension ring and performing the required elliptic curve operations over the ring. Moreover, new methods perform a point validation check in a small subring of the extension ring to give an efficient fault attack countermeasure.