Please use this identifier to cite or link to this item: http://repository.kln.ac.lk/handle/123456789/20329
Title: Scalar and Multi-Scalar Addition Chain in Elliptic Curve Cryptography
Authors: Nisansala, W.V.A.
Wijesiri, G.S.
Keywords: Elliptic Curve Cryptography
Simple Power Analysis
Doubling-free Addition Chain
Issue Date: 2019
Publisher: 4th International Conference on Advances in Computing and Technology (ICACT ‒ 2019), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka
Citation: Nisansala, W.V.A. and Wijesiri, G.S. (2019). Scalar and Multi-Scalar Addition Chain in Elliptic Curve Cryptography. 4th International Conference on Advances in Computing and Technology (ICACT ‒ 2019), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka. p9.
Abstract: Cryptography is a mathematical based technology that ensure the security of communications in the presence of malicious adversaries. Nowadays, cryptography deals with designing of algorithms, protocols and systems to secure transfer of information. The Elliptic Curve Cryptography (ECC) is a main branch of the public key cryptography (asymmetric cryptosystem) which was introduced by Neal Koblitz and Victor Miller in 1985. Higher speed, the efficiency of using power, bandwidth and less storage are some advantages of ECC. The strength of ECC is based on the inability of determining the scalar k of the scalar multiplication kP, where P is a point of an elliptic curve in finite field and it is known as the Elliptic Curve Discrete Logarithm Problem (ECDLP). Hence, the scalar multiplication is the central operation of ECC. Since most of the efficient and secure exponentiation methods (i.e. double-and-add, triple-and-add methods) depend on the secret scalar or exponent, an attacker may reveal the secret information through the side channel analysis (side channel attack). Simple Power Analysis (SPA) is a type of side channel attack that an attacker retrieves secret key by observing the power consumption traces. One way to overcome this problem is the use of doubling free addition chain since it results a fixed sequence of operations, and an attacker cannot detect any information through SPA. Therefore, we have implemented a new methodology that is more secure and reasonably efficient, a doubling free simultaneous addition chain involving Lucas pattern to compute the scalar and multiscalar multiplication.
URI: http://repository.kln.ac.lk/handle/123456789/20329
Appears in Collections:ICACT 2019

Files in This Item:
File Description SizeFormat 
9.pdf47.08 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.