METHOD AND APPARATUS FOR PERFORMING ELLIPTIC CURVE SCALAR MULTIPLICATION IN A MANNER THAT COUNTERS POWER ANALYSIS ATTACKS

When multiplicative splitting is used to hide a scalar in an Elliptic Cur ve scalar Multiplication ECSM operation, the associated modular division ope ration employs the known Almost Montgomery Inversion algorithm. By including dummy operations in some of the branches of the main iteration loop of t...

Full description

Saved in:
Bibliographic Details
Main Author EBEID, NEVINE MAURICE NASSIF
Format Patent
LanguageEnglish
French
Published 12.09.2008
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:When multiplicative splitting is used to hide a scalar in an Elliptic Cur ve scalar Multiplication ECSM operation, the associated modular division ope ration employs the known Almost Montgomery Inversion algorithm. By including dummy operations in some of the branches of the main iteration loop of the Almost Montgomery Inversion algorithm, all branches of the algorithm may be viewed, from the perspective of a Power Analysis-based attack, as equivalent and, accordingly, devoid of information useful in determining the value of the scalar, which may be a cryptographic private key.
Bibliography:Application Number: CA20082680054