TY - CHAP
T1 - On the exact flexibility of the flexible countermeasure against side channel attacks
AU - Okeya, Katsuyuki
AU - Takagi, Tsuyoshi
AU - Vuillaume, Camille
PY - 2004
Y1 - 2004
N2 - Although elliptic curve cryptosystems are attractive candidates for implementing cryptography in memory constrained environments, in this context, one has to care about side channel attacks, which allow to reveal secret parameters by observing side channel information. Okeya and Takagi presented a fast countermeasure against side channel attacks on elliptic curves and qualified it as "flexible", since the user has full control on the ratio between memory consumption and efficiency. In this paper, we present two weaknesses in their scheme. We repair one of the weaknesses with a better implementation of their countermeasure, and recommend an additional countermeasure for repairing the second. Finally, we describe the situations where the repaired scheme is indeed flexible, that is, when it shows greater efficiency without compromising security.
AB - Although elliptic curve cryptosystems are attractive candidates for implementing cryptography in memory constrained environments, in this context, one has to care about side channel attacks, which allow to reveal secret parameters by observing side channel information. Okeya and Takagi presented a fast countermeasure against side channel attacks on elliptic curves and qualified it as "flexible", since the user has full control on the ratio between memory consumption and efficiency. In this paper, we present two weaknesses in their scheme. We repair one of the weaknesses with a better implementation of their countermeasure, and recommend an additional countermeasure for repairing the second. Finally, we describe the situations where the repaired scheme is indeed flexible, that is, when it shows greater efficiency without compromising security.
UR - http://www.scopus.com/inward/record.url?scp=33745587326&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33745587326&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-27800-9_40
DO - 10.1007/978-3-540-27800-9_40
M3 - Chapter
AN - SCOPUS:33745587326
SN - 9783540223795
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 466
EP - 477
BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
A2 - Wang, Huaxiong
A2 - Pieprzyk, Josef
A2 - Varadharajan, Vijay
PB - Springer Verlag
ER -