2011 Design, Automation &Amp; Test in Europe 2011
DOI: 10.1109/date.2011.5763165
|View full text |Cite
|
Sign up to set email alerts
|

Low-cost fault detection method for ECC using Montgomery powering ladder

Abstract: When using Elliptic Curve Cryptography (ECC) in constrained embedded devices such as RFID tags, López-Dahab's method along with the Montgomery powering ladder is considered as the most suitable method. It uses x-coordinate only for point representation, and meanwhile offers intrinsic protection against simple power analysis. This paper proposes a low-cost fault detection mechanism for Elliptic Curve Scalar Multiplication (ECSM) using the López-Dahab algorithm. Introducing minimal changes to the last round of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…In the protocol, the tag's identity information adopts 96-bit electronic product coding of EPC Global RFID standard, and the output of the hash function is 160 bits in order to reduce the risk of birthday attack. According to the montgomery algorithm [16] on standard projective coordinates, the input of the algorithm is only its affine x-coordinate, which can decrease the size of the messages.…”
Section: Security Analysis and Performance Comparisonmentioning
confidence: 99%
“…In the protocol, the tag's identity information adopts 96-bit electronic product coding of EPC Global RFID standard, and the output of the hash function is 160 bits in order to reduce the risk of birthday attack. According to the montgomery algorithm [16] on standard projective coordinates, the input of the algorithm is only its affine x-coordinate, which can decrease the size of the messages.…”
Section: Security Analysis and Performance Comparisonmentioning
confidence: 99%
“…Another widely exploited protection of the MPL [84] based exponentiation is checking a coherency between the intermediate variables in the algorithm. Checking if the difference between two intermediate points is exactly one base point is an efficient fault detection for ECC [85], [86]. Similarly, the coherence between the two intermediates can be used to detect faults in RSA implementations.…”
Section: B Fault Detection Mechanismsmentioning
confidence: 99%
“…For instance, if the protection requires redundant memory locations, its area overhead can be up to 30% [78]. On the other hand, if the existing memory and datapath can be re-used, the area overhead can be as low as 1% [94]. The introduced time overhead mainly depends on the frequency of the countermeasure's activation.…”
Section: Effectiveness and Cost Of The Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Algorithmic protections have been proposed by Giraud [22] (and many others [16,32,29]) for CRT-RSA, which naturally transpose to ECC, as shown in [28]. These protections are implementation specific (e.g., depend on the chosen exponentiation algorithm) and are thus difficult to automate, requiring specialized engineering skills.…”
mentioning
confidence: 99%