首页 | 本学科首页   官方微博 | 高级检索  
     

抗SPA的多点乘算法
引用本文:程一飞,冯新亚.抗SPA的多点乘算法[J].微机发展,2006,16(5):106-108.
作者姓名:程一飞  冯新亚
作者单位:安庆师范学院计算机系 安徽安庆246011
基金项目:安徽省教育厅自然科学研究项目(2005KJ365zc)
摘    要:SPA(Simple Power Analysis)攻击可能通过泄露的信息获取内存受限制的设备中的密钥,它是通过区分一次点乘运算中点加运算和倍点运算进行的。抗SPA攻击的点乘算法较多,但对于多点乘算法相关措施较少。Sharmir-NAF多点乘算法是一个时间和空间效率都非常优秀的多点乘算法。为此提出一种基于Sharmir-NAF的抗SPA攻击的多点乘算法。新的算法在内存空间消耗和计算速度上较原算法负担增加可以忽略不计,而且能够抗SPA攻击。

关 键 词:点乘  多点乘  SPA  Sharmir-NAF
文章编号:1673-629X(2006)05-0106-03
修稿时间:2005年8月20日

A SPA- Resistant Multiple Scalar Multiplication Algorithm
CHENG Yi-fei,FENG Xin-ya.A SPA- Resistant Multiple Scalar Multiplication Algorithm[J].Microcomputer Development,2006,16(5):106-108.
Authors:CHENG Yi-fei  FENG Xin-ya
Abstract:The Simple Power Analysis(SPA) attack might break the implementation of elliptic curve cryptosystem on memory constraint devices such as smart cartagainst.It attacks elliptic curve cryptosystem by distinguishing between point doubling and point addition in a single execution of scalar multiplication.Although there have been many SPA-resistant scalar multiplication algorithms,there are few countermeasures for multiple scalar multiplication.The Sharmir-NAF algorithm is an excellent algorithm in efficiency and memory.A new SPA-resistant multiple scalar multiplication algorithm is proposed,which is based on the Sharmir-NAF algorithm.The computational and memory overheads of the new algorithm are almost negligible,but it is SPA resistant.
Keywords:scalar multiplication  multiple scalar multiplication  simple power analysis  Sharmir-NAF
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号