EP1530753A2 - Berechnungsverfahren für kryptographie mittels elliptischer kurven - Google Patents
Berechnungsverfahren für kryptographie mittels elliptischer kurvenInfo
- Publication number
- EP1530753A2 EP1530753A2 EP03753669A EP03753669A EP1530753A2 EP 1530753 A2 EP1530753 A2 EP 1530753A2 EP 03753669 A EP03753669 A EP 03753669A EP 03753669 A EP03753669 A EP 03753669A EP 1530753 A2 EP1530753 A2 EP 1530753A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- point
- coordinates
- curve
- points
- elliptical curve
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
Definitions
- the present invention relates to a universal calculation method applied to points of an 'elliptical curve, and an electronic component comprising ' means for implementing such a method.
- the invention is particularly applicable for the implementation of cryptographic algorithms of the public key type, - for example in smart cards.
- curves have. special properties. For example, an elliptical curve having a point of order 2 has a cardinal divisible by 2. Or, an elliptic curve having a point of order three is a curve such that the cardinal of the group ⁇ (1 is divisible by 3. The curves having the same particular property are grouped in the same family.
- a point on an elliptical curve can be represented by several types of coordinates, for example by affine coordinates or projective coordinates of Jac ' obi.
- a commonly used model is the so-called Weierstrass model.
- the ' Weierstrass ' model is very general since any elliptical curve can be reduced to this model.
- Each model can be used using different types of coordinates.
- the Weierstrass model is defined as follows: the neutral point O (the point at infinity in the Weierstrass model) and the set of points
- Y 2 X 3 + a * X + b (FI) with a, b ⁇ Î such that 4a 3 + 27b 2 ⁇ 0, form the group of rational points of an elliptic curve ⁇ E ().
- the point P can also be represented by projective Jacobi coordinates of the general form (U, V, W).
- V 2 U 3 + a * UW 4 + b * W 6 (F3)
- Projective coordinates are particularly interesting in exponentiation calculations applied to points on an elliptical curve, because they do not include inversion calculations in the body.
- the result . of this scalar multiplication dxPl is a point P2 of the elliptic curve.
- the obtained point P2 is the public key. is used to encrypt a message.
- etching is meant to cover channel • single or differential, an attack based on a physical quantity measurable from outside the device, and whose direct analysis (simple attack) or analysis using a statistical method (differential attack) allows to discover information contained and manipulated in processing in the device. These attacks can thus make it possible to discover confidential information. These attacks were notably revealed in Dl (Paul Kocher, Joshua JAFFE and Benjamin JUN. Differential Power Analysis. Advances in Cryptology - CRYPTO'99, vol. 1666 of Lecture Notes in Computer Science, pp.388-397. Springer-Verlag, 1999).
- One object of the invention is to propose a solution for protection against attacks with hidden channels, in particular SPA attacks, more effective than the solutions already known.
- Another object of the invention to provide a solution that can be implemented 'in a circuit having little memory space, for example for a smart card type application.
- the invention relates to a universal calculation method on points of an elliptical curve.
- the elliptical curve is defined by a quartic equation and identical programmed calculation means are used to carry out an operation of adding points, an operation of doubling points, and an operation of adding a point neutral, the calculation means comprising in particular a central unit associated with a memory.
- the use of a model of the elliptic curve in the form of a quartic that is to say of a polynomial of the 4 th degree) - makes it possible to use a formulation unique for performing point addition, point doubling • and neutral point addition operations. the curve.
- the invention also relates to the use of a
- the invention also relates to an electronic i5 component comprising programmed calculation means for implementing a universal calculation method as described above or a cryptographic method using the above universal calculation method.
- the calculation means notably comprise a central unit 20. associated with a memory.
- the invention also relates to a smart card comprising the above electronic component.
- the device 1 is a smart card intended to execute a cryptographic program. To this end, the device 1 brings together in
- a chip of the programmed calculation means composed of a Central unit 2 connected diagram 'ionnellement a memory array including:
- a memory 4 accessible in read only in the example of the mask ROM type, also known by the English name “mask read-only memory (mask ROM)", a memory 6 that can be re-programmable electrically, in the example of the type EEPROM (from English “electrically erasable programmable ROM”), and - a working memory 8 accessible in read and write, in the example of "type RAM (from English” random access memory ").
- memory notably includes calculation registers used by device 1.
- the executable code corresponding to the scalar multiplication algorithm is contained in program memory. This code can in practice be contained in memory 4, accessible in read only, and / or in memory 6, rewritable.
- the central unit 2 is connected to a communication interface 10 which ensures the exchange of signals vis-à-vis, from the outside and the supply of the chip.
- This interface can include pads on the card for a so-called “contact” connection with a reader, and / or an antenna in the case of a so-called “contactless” card.
- One of the functions of the device 1 is to encrypt or decrypt a confidential message m respectively transmitted to, or received from, the outside. This message can concern for example 'personal codes,
- the central unit 2 executes a cryptographic algorithm on data from programming which are stored in the mask 4 and / or EEPROM 6 ROM parts.
- the algorithm used here is a key algorithm. public on elliptical curve as part of a model in the form of a quartic. We will focus more precisely here on a part of this algorithm, which makes it possible to carry out basic operations, that is to say operations of addition: addition of two distinct points, of two identical points (it is i.e. an operation of doubling a point) ,, of a point
- equation ' F13 can also be written, in. Jacobi's projective coordinates:
- V 2 bU 4 + aU 3 W + UW 3 (F14)
- V3 (Ul 2 .V2 + u2 2 .Vl) * (4b. (U1.W2 + U2.W1) .W1.W2
- W3 (aUl.U2-Wl.W2) 2 -4bUl.U2 (U1.W2 + U2.W1) (F17)
- P2 can be different from PI, equal to PI and / or equal to neutral O of the curve.
- the addition operation is given in projective coordinates of Jacobi.
- V 2 ⁇ .X 4 - 2 ⁇ .U 2 X 2 + -W 4 ' (F20)
- the central unit 2 then calculates the coordinates of the point P3 according to the relationships:
- the coordinates (U3: V3: W3) of the point P3 are finally stored in registers of the working memory 8, to be used elsewhere, for example for the rest of the encryption algorithm.
- V3 [(W1.W2) 2 + (U1.U2) 2 ]
- formulas F27 to F29 can be carried out as follows: rl p ul.u2 r2 p wl .w2 r3 p rl. r2 r4 p vl.v2 r5 p ul. l + vl r6 p u2.w2 + v2 u3 p r5.r6 - r4-r3 w3 p (r2-rl). (r2 + rl) r6 p ⁇ * r3 r4 p r4 - 2. r6 r6 p (r2 + rl) '2 -2r3 r4 p r4.
- r6 r6 p (ul + wl). (u2 + w2) -rl-r2 r5 p r6 2 - 2r3 r6 p r5. r ' 3 v3 p r4 + 2. r6 where ul, vl, wl, u2, v2, w2, u3, v3, w3 are calculation registers in which the projective coordinates of points PI, P2, P3, and rl to r6 are temporary calculation registers.
- the coordinates of the point P3 are obtained in a time equal to approximately 13 times the time to complete a
- the invention is thus much less than the time for calculating the coordinates of P3 using a formulation such as those of the prior art.
- P2 can be different from PI, equal to PI and / or equal to neutral O of the curve.
- the addition operation is given in this example in affine coordinates.
- the unit central 2 When the exponentiation calculation device is requested -to perform an addition operation, the unit central 2 first of all stores in calculation registers the coordinates (XI, Yl) and (X2, Y2) of the points PI, P2 of the elliptical curve, to be added.
- Y3 ⁇ [l + ⁇ (Xl.X2) 2 ]. [Y1.Y2 - 2 ⁇ .Xl .X2] + 2 ⁇ .Xl .X2. (Xl 2 + X2 2 ) ⁇
- the coordinates (X3, Y3) of the point P3 are finally stored in registers of the working memory 8, to be used elsewhere, for example for the rest of the encryption algorithm.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Pure & Applied Mathematics (AREA)
- Mathematical Optimization (AREA)
- Mathematical Analysis (AREA)
- Computing Systems (AREA)
- Mathematical Physics (AREA)
- Computational Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Algebra (AREA)
- Complex Calculations (AREA)
- Cash Registers Or Receiving Machines (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| FR0210193A FR2843506B1 (fr) | 2002-08-09 | 2002-08-09 | Procede de calcul universel applique a des points d'une courbe elliptique definie par une quartique, procede cryptographique et composant electronique associes |
| FR0210193 | 2002-08-09 | ||
| PCT/FR2003/002462 WO2004017193A2 (fr) | 2002-08-09 | 2003-08-05 | Procede de calcul universel applique a des points d'une courbe elliptique |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP1530753A2 true EP1530753A2 (de) | 2005-05-18 |
Family
ID=30471060
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP03753669A Withdrawn EP1530753A2 (de) | 2002-08-09 | 2003-08-05 | Berechnungsverfahren für kryptographie mittels elliptischer kurven |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US20060056619A1 (de) |
| EP (1) | EP1530753A2 (de) |
| JP (1) | JP2005535927A (de) |
| AU (1) | AU2003271831A1 (de) |
| FR (1) | FR2843506B1 (de) |
| WO (1) | WO2004017193A2 (de) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR100530372B1 (ko) * | 2003-12-20 | 2005-11-22 | 삼성전자주식회사 | 사이드채널 공격을 방지할 수 있는 타원곡선 암호화 방법 |
| US7991162B2 (en) * | 2007-09-14 | 2011-08-02 | University Of Ottawa | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields |
| KR101549291B1 (ko) * | 2012-10-25 | 2015-09-02 | 엘지디스플레이 주식회사 | 표시장치 |
| US11146397B2 (en) * | 2017-10-31 | 2021-10-12 | Micro Focus Llc | Encoding abelian variety-based ciphertext with metadata |
| CN108875416B (zh) * | 2018-06-22 | 2020-05-19 | 北京智芯微电子科技有限公司 | 椭圆曲线多倍点运算方法和装置 |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6778666B1 (en) * | 1999-03-15 | 2004-08-17 | Lg Electronics Inc. | Cryptographic method using construction of elliptic curve cryptosystem |
| FR2828779B1 (fr) * | 2001-08-17 | 2004-01-16 | Gemplus Card Int | Procede de calcul universel applique a des points d'une courbe elliptique |
-
2002
- 2002-08-09 FR FR0210193A patent/FR2843506B1/fr not_active Expired - Fee Related
-
2003
- 2003-08-05 AU AU2003271831A patent/AU2003271831A1/en not_active Abandoned
- 2003-08-05 WO PCT/FR2003/002462 patent/WO2004017193A2/fr not_active Ceased
- 2003-08-05 JP JP2004528585A patent/JP2005535927A/ja not_active Withdrawn
- 2003-08-05 EP EP03753669A patent/EP1530753A2/de not_active Withdrawn
- 2003-08-05 US US10/523,840 patent/US20060056619A1/en not_active Abandoned
Non-Patent Citations (2)
| Title |
|---|
| None * |
| See also references of WO2004017193A3 * |
Also Published As
| Publication number | Publication date |
|---|---|
| AU2003271831A8 (en) | 2004-03-03 |
| FR2843506A1 (fr) | 2004-02-13 |
| JP2005535927A (ja) | 2005-11-24 |
| WO2004017193A3 (fr) | 2004-05-06 |
| AU2003271831A1 (en) | 2004-03-03 |
| FR2843506B1 (fr) | 2004-10-29 |
| US20060056619A1 (en) | 2006-03-16 |
| WO2004017193A2 (fr) | 2004-02-26 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1358732B2 (de) | Verfahren zur gesicherten verschlüsselung und baustein zur ausführung eines solchen verschlüsselungsverfahrens | |
| EP2946284B1 (de) | Kryptografisches verfahren mit einem betrieb durch multiplikation mittels eines skalars oder einer exponentiation | |
| WO2009035982A1 (en) | Secure modular exponentiation by randomization of exponent scanning | |
| WO2003024017A2 (fr) | Procede de securisation d'une quantite secrete | |
| EP1166494A1 (de) | Gegenmassnahmen in einem elektronischen baustein zur ausführung eines krypto-algorithmus mit auf elliptischen kurven basierendem öffentlichem schlüssel | |
| EP1381936B1 (de) | Gegenmassnahmen in einem elektronischen baustein zur ausführung eines krypto-algorithmus mit auf elliptischen kurven basierendem öffentlichen schlüssel | |
| EP1421473B1 (de) | Universelles berechnungsverfahren für punkte auf einer elliptischen kurve | |
| EP1832974A1 (de) | Schutz vor elektromagnetischer Analyse einer Berechnung in einem elektronischen Schaltkreis | |
| EP1994465A1 (de) | Verfahren zur verschlüsselung einer berechnung einer exponentiation oder multiplikation mittels skalar bei einer elektronischen vorrichtung | |
| WO2003014916A1 (fr) | Procede securise de realisation d'une operation d'exponentiation modulaire | |
| EP1530753A2 (de) | Berechnungsverfahren für kryptographie mittels elliptischer kurven | |
| EP1279141A2 (de) | Gegenmassnahmeverfahren in einer mikroschaltung und ic-karte mit einer solchen schaltung | |
| WO2002099624A1 (fr) | Procede de securisation d'un calcul d'exponentiation dans un dispositif electronique | |
| FR2818846A1 (fr) | Procede de contre-mesure dans un composant electronique mettant en oeuvre un algorithme de cryptographie | |
| EP1346271A1 (de) | Verfahren zum gewährleisten von einem logischen oder mathematischen operator in einem elektronischen mikroprozessormodul | |
| EP1839125A1 (de) | Sicheres und kompaktes exponentiationsverfahren für die kryptographie | |
| WO2002093411A1 (fr) | Dispositif destine a realiser des calculs d"exponentiation appliques a des points d"une courbe elliptique | |
| EP4270855A1 (de) | Schutz gegen seitenkanalangriffe mit quadratischer maskierung | |
| WO2002082257A1 (fr) | Dispositif destine a realiser des calculs d'exponentiation securisee et utilisation d'un tel dispositif | |
| FR3145222A1 (fr) | Protection contre les attaques par canal auxiliaire d’un algorithme cryptographique impliquant une table de substitution | |
| EP1949292A1 (de) | Verfahren zum sicheren handhaben von daten während des ausführens kryptografischer algorithmen auf eingebetteten systemen | |
| WO2002050658A1 (fr) | Procedes de contre-mesure dans un composant electronique mettant en ouvre un algorithme de cryptographie a cle publique de type rsa | |
| EP1891769A1 (de) | Schutz einer modularen potenzierungsberechnung mittels integrierter schaltung | |
| FR2998692A1 (fr) | Procede de traitement cryptographique comprenant des operations booleennes sur des donnees masquees de maniere arithmetique, dispositifs et produit programme d'ordinateur correspondants | |
| FR2986883A1 (fr) | Procede de generation securise d'un nombre premier, produit programme d'ordinateur et composant electronique correspondants |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| 17P | Request for examination filed |
Effective date: 20050309 |
|
| AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL LT LV MK |
|
| DAX | Request for extension of the european patent (deleted) | ||
| 17Q | First examination report despatched |
Effective date: 20070104 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20070717 |