METHOD AND APPARATUS FOR PERFORMING ELLIPTIC CURVE SCALAR MULTIPLICATION IN A MANNER THAT COUNTERS POWER ANALYSIS ATTACKS
When multiplicative splitting is used to hide a scalar in an Elliptic Cur ve scalar Multiplication ECSM operation, the associated modular division ope ration employs the known Almost Montgomery Inversion algorithm. By including dummy operations in some of the branches of the main iteration loop of t...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | English French |
Published |
12.09.2008
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | When multiplicative splitting is used to hide a scalar in an Elliptic Cur ve scalar Multiplication ECSM operation, the associated modular division ope ration employs the known Almost Montgomery Inversion algorithm. By including dummy operations in some of the branches of the main iteration loop of the Almost Montgomery Inversion algorithm, all branches of the algorithm may be viewed, from the perspective of a Power Analysis-based attack, as equivalent and, accordingly, devoid of information useful in determining the value of the scalar, which may be a cryptographic private key. |
---|---|
Bibliography: | Application Number: CA20082680054 |