On the exact flexibility of the flexible countermeasure against side channel attacks

Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

Abstract

Although elliptic curve cryptosystems are attractive candidates for implementing cryptography in memory constrained environments, in this context, one has to care about side channel attacks, which allow to reveal secret parameters by observing side channel information. Okeya and Takagi presented a fast countermeasure against side channel attacks on elliptic curves and qualified it as "flexible", since the user has full control on the ratio between memory consumption and efficiency. In this paper, we present two weaknesses in their scheme. We repair one of the weaknesses with a better implementation of their countermeasure, and recommend an additional countermeasure for repairing the second. Finally, we describe the situations where the repaired scheme is indeed flexible, that is, when it shows greater efficiency without compromising security.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
EditorsHuaxiong Wang, Josef Pieprzyk, Vijay Varadharajan
PublisherSpringer Verlag
Pages466-477
Number of pages12
ISBN (Print)9783540223795
DOIs
Publication statusPublished - 2004

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3108
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'On the exact flexibility of the flexible countermeasure against side channel attacks'. Together they form a unique fingerprint.

Cite this