Computer Science ›› 2021, Vol. 48 ›› Issue (6A): 533-537.doi: 10.11896/jsjkx.191200097

• Information Security • Previous Articles     Next Articles

Resisting Power Analysis Algorithm of Scalar Multiplication Based on Signed Sliding Window

GONG Jian-feng   

  1. Department of Computer Engineering,Maoming Polytechnic,Maoming,Guangdong 525011,China
  • Online:2021-06-10 Published:2021-06-17
  • About author:GONG Jian-feng,postgraduate,lecturer.His main research interests include computer network technology and information security.
  • Supported by:
    General program of Natural Science in Guangdong Province(2016A030313288).

Abstract: In order to resolve the problem that the operating efficiency of scalar multiplication will be reduced after applying the power analysis attacks measures,a resisting power analysis algorithm of scalar multiplication based on signed sliding window is presented.The presented algorithm recodes the scalar with the signed sliding window,and realizes resisting power analysis attacks by combining with the pre-computation,point mask and field operation.Finally,the scalar multiplication is completed in the system of hybrid coordinate.Performance analysis results indicate that the presented algorithm can effectively resist simple power analysis,differential power analysis,zero-value power analysis,and refined power analysis and so on,and the presented scheme also can significantly improved the operating efficiency by comparing with the resisting power analysis scheme of binary expansion and key assignment.It is concluded that the presented scheme can take into account both security and efficiency,and can be applied to kinds of cryptographic systems with limited resource.

Key words: Field operation, Power analysis, Pre-computation, Scalar multiplication, Signed sliding window

CLC Number: 

  • TP309
[1] GUO B,SUN Z T,WANG Y,et al.Resisting power analysis attacks algorithm of scalar multiplication based on factorial expansions form [J].Bulletin of Science and Technology,2016,32(6):149-153.
[2] WU K K,LI H Y,YAN L J.Homogeneous mapping model of ECC for preventing differential power analysis[J].Computer Engineering,2017,43(10):115-119.
[3] LIANG F,SHEN J N.Resisting power analysis attacks scheme for ellipse curve cryptography based on odd-only Comb method[J].Computer Applications and Software,2016,33(3):288-290.
[4] MA B,BAO S G,DAI X Y.Efficiency improvement of ECC resisting power attack scheme in smart card[J].Computer Engineering,2010,36(16):113-115.
[5] WANG Z Y,ZHAO J G.Resisting power analysis attack scheme based on signed double-based number system[J].Journal of Computer Applications,2011,31(11):2973-2974.
[6] YANG B.Secure and efficient scalar multiplication algorithmwith power analysis attack resistance[J].Control Engineering of China,2017,24(12):2462-2465.
[7] LI Y,WANG J L,ZENG X W,et al.A segmented Montgomery scalar multiplication algorithm with resistance to simple power analysis SPA attacks[J].Computer Engineering and Science,2017,30(1):92-101.
[8] SHI L,XU M.DWNAF:a dynamic window NAF scalar multiplication with threshold[J].Computer Science,2017,44(10):159-164.
[9] PHILLIPS B J,BURGESS N.Implementing 1024-bits RSA exponentiation on a 32-bits processor core[C]//Proceeding of the Application Specific-Systems,Architecture and Processor.2000:127-137.
[10] WEI G H,WANG Y,ZHANG H G.ECC point multiplication lightweight improvement for RFID applications over GF(2m)[J].Computer Engineering and Science,2017,39(1):81-85.
[11] WANG Y X,ZHANG C R,ZHANG B H,et al.Efficient scalar multiplication of ECC based on composite operations over prime fields[J].Application Research of Computers,2013,30(11):3365-3387.
[12] LIU G Z,QI H X.Efficient NAF scalar multiplication algorithm with low storage[J].Science Technology and Engineering,2013,13(19):5683-5686.
[13] BARUA R,PANDEY S K,PANKAJ R.Efficient window-based scalar multiplication on elliptic curves using double-base number system [J].Lecture Notes in Computer Science,2007,4859(12):351-360.
[1] YOU Wen-zhu, GE Hai-bo. High-performance FPGA Implementation of Elliptic Curve ECC on Binary Domain [J]. Computer Science, 2020, 47(8): 127-131.
[2] WU Gui-ming, ZHENG Fang, XIE Xiang-hui, WU Dong and YAN Xin-kai. Hardware Implementation of Scalar Multiplication on Elliptic Curves over GF(2m) [J]. Computer Science, 2015, 42(1): 79-81.
[3] LI Zhong. Fast Scalar Multiplication with Resistance Against SPA Attacks [J]. Computer Science, 2014, 41(Z6): 374-376.
[4] WANG Yu-xi,ZHANG Chuan-rong and ZHANG Bing-hong. Improved Fast Algorithm of Scalar Multiplication for Fix Base Point [J]. Computer Science, 2013, 40(10): 135-138.
[5] . Fast Scalar Multiplication Based on Sliding Window Technology [J]. Computer Science, 2012, 39(Z6): 54-56.
[6] . Power Analysis for Executable Program on Single Computer Based on Artificial Neural Network [J]. Computer Science, 2012, 39(5): 282-286.
[7] . Correlation Power Analysis on ARIA Block Cipher [J]. Computer Science, 2012, 39(2): 92-94.
[8] . Simulation Platform for Differential Power Analysis Attack on DES [J]. Computer Science, 2012, 39(2): 59-60.
[9] LIU Hui-ying,WANG Tao,ZHAO Xin-jie,ZHOU Lin. Research on Correlation Power Analysis Attack against PRESENT [J]. Computer Science, 2011, 38(11): 40-42.
[10] LI Lang,LI Jing,LI Ren-fa,WU Ke-shou. Research of an Efficient Power Analysis Physical Experiment Platform [J]. Computer Science, 2010, 37(6): 75-77.
[11] . [J]. Computer Science, 2009, 36(6): 16-18.
[12] . [J]. Computer Science, 2009, 36(5): 96-98.
[13] . [J]. Computer Science, 2008, 35(6): 186-189.
[14] JIANG Su-Li ,CHEN Yong (The Department of Computer and Science,Chongqing University, Chongqing 400044). [J]. Computer Science, 2006, 33(9): 281-283.
[15] HAO Yan-Hua,TAN Shi-Chong,WANG Yu-Min (National Key Laboratory on ISN, Xidian University, Xi'an 710071). [J]. Computer Science, 2006, 33(10): 84-89.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!