Low-Cost countermeasure against RPA

  • Authors:
  • Jean-Luc Danger;Sylvain Guilley;Philippe Hoogvorst;Cédric Murdica;David Naccache

  • Affiliations:
  • Secure-IC S.A.S., Rennes, France, Département COMELEC, Institut TELECOM, TELECOM ParisTech, CNRS LTCI, Paris, France;Secure-IC S.A.S., Rennes, France, Département COMELEC, Institut TELECOM, TELECOM ParisTech, CNRS LTCI, Paris, France;Département COMELEC, Institut TELECOM, TELECOM ParisTech, CNRS LTCI, Paris, France;Secure-IC S.A.S., Rennes, France, Département COMELEC, Institut TELECOM, TELECOM ParisTech, CNRS LTCI, Paris, France;Département d'informatique, École normale supérieure, Paris Cedex 05, France

  • Venue:
  • CARDIS'12 Proceedings of the 11th international conference on Smart Card Research and Advanced Applications
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

On smart-cards, Elliptic Curve Cryptosystems (ECC) can be vulnerable to Side Channel Attacks such as the Refined Power Analysis (RPA). This attack takes advantage of the apparition of special points of the form (0, y). In this paper, we propose a new countermeasure based on co-Z formulæ and an extension of the curve isomorphism countermeasure. It permits to transform the base point P=(x, y) into a base point P′=(0, y′), which, with −P′, are the only points with a zero X-coordinate. In such case, the RPA cannot be applied. Moreover, the cost of this countermeasure is very low compared to other countermeasures against RPA.