Efficient scalar multiplication against side channel attacks using new number representation
Institution: | University of Windsor |
---|---|
Department: | |
Year: | 2017 |
Keywords: | Cryptography; Scalar multiplication; Side channel attack |
Posted: | 02/01/2018 |
Record ID: | 2154641 |
Full text PDF: | http://scholar.uwindsor.ca/etd/5940 |
Elliptic curve cryptography (ECC) is probably the most popular public key systems nowadays. The classic algorithm for computation of elliptic curve scalar multiplication is Doubling-and-Add. However, it has been shown vulnerable to simple power analysis, which is a type of side channel attacks (SCAs). Among different types of attacks, SCAs are becoming the most important and practical threat to elliptic curve computation. Although Montgomery power ladder (MPL) has shown to be a good choice for scalar multiplication against simple power analysis, it is still subject to some advanced SCAs such like differential power analysis. In this thesis, a new number representation is firstly proposed, then several scalar multiplication algorithms using this new number system are presented. It has also been shown that the proposed algorithms outperform or comparable to the best of existing similar algorithms in terms of against side channel attacks and computational efficiency. Finally we extend both the new number system and the corresponding scalar multiplication algorithms to high radix cases.Advisors/Committee Members: Wu, Hua, Mirhassani, Mitra.