Preventing Distinguishability between Multiplication and Squaring Operations
Abstract
Scalar multiplication kP is a critical operation in Elliptic Curve Cryptosystems (ECC), often targeted by Side-Channel Analysis (SCA). Despite strategies based on atomic patterns to enhance security, the binary kP algorithms remain susceptible to simple SCA due to energy consumption variations in field multipliers during passing two different or two identical operands. This vulnerability arises independent of the multiplication method used. We implemented and analysed two mitigation techniques: ...
Description / Details
Scalar multiplication kP is a critical operation in Elliptic Curve Cryptosystems (ECC), often targeted by Side-Channel Analysis (SCA). Despite strategies based on atomic patterns to enhance security, the binary kP algorithms remain susceptible to simple SCA due to energy consumption variations in field multipliers during passing two different or two identical operands. This vulnerability arises independent of the multiplication method used. We implemented and analysed two mitigation techniques: one involving data redirection and another focusing on bus reloading.
Source: arXiv:2604.26536v1 - http://arxiv.org/abs/2604.26536v1 PDF: https://arxiv.org/pdf/2604.26536v1 Original Link: http://arxiv.org/abs/2604.26536v1
Please sign in to join the discussion.
No comments yet. Be the first to share your thoughts!
Apr 30, 2026
Computer Science
Cybersecurity
0