Comparison of Simple Power Analysis attack resistant algorithms for an elliptic curve cryptosystem

Research output: Contribution to journalArticlepeer-review

Abstract

Side channel attacks such as Simple Power Analysis(SPA) attacks provide a new challenge for securing algorithms from an attacker. Algorithms for elliptic curve point scalar multiplication such as the double and add method are prone to these attacks. The protected double and add algorithm provides a simple solution to this problem but is costly in terms of performance. Another class of algorithm for point scalar multiplication that makes use of special addition chains can be used to protect against SPA attacks. A reconfigurable architecture for a cryptographic processor is presented and a number of algorithms for point multiplication are implemented and compared. These algorithms have a degree of parallism within their operations where a number of multiplications can be executed in parallel. Sophisticated scheduling techniques can exploit this parallelism in order to optimize the performance of the calculation. Post place and route results for the processor are given.

Original languageEnglish
Pages (from-to)52-62
Number of pages11
JournalJournal of Computers
Volume2
Issue number10
DOIs
Publication statusPublished - 2007

Keywords

  • Cryptography
  • Ellitipic curves
  • Scheduling techniques
  • Side channel attacks

Fingerprint

Dive into the research topics of 'Comparison of Simple Power Analysis attack resistant algorithms for an elliptic curve cryptosystem'. Together they form a unique fingerprint.

Cite this