The Community for Technology Leaders
Green Image
<p><b>Abstract</b>—Because of their shorter key sizes, cryptosystems based on elliptic curves are being increasingly used in practical applications. A special class of elliptic curves, namely, Koblitz curves, offers an additional, but crucial, advantage of considerably reduced processing time. In this article, power analysis attacks are applied to cryptosystems that use scalar multiplication on Koblitz curves. Both the <it>simple</it> and the <it>differential</it> power analysis attacks are considered and a number of countermeasures are suggested. While the proposed countermeasures against the simple power analysis attacks rely on making the power consumption for the elliptic curve scalar multiplication independent of the secret key, those for the differential power analysis attacks depend on randomizing the secret key prior to each execution of the scalar multiplication. These countermeasures are computationally efficient and suitable for hardware implementation.</p>
Cryptography, elliptic curve scalar multiplication, finite (or Galois) fields, Koblitz curves, number system, power analysis attacks.

M. Hasan, "Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Curve Cryptosystems," in IEEE Transactions on Computers, vol. 50, no. , pp. 1071-1083, 2001.
87 ms
(Ver 3.3 (11022016))