Scott Fluhrer edited untitled.tex  almost 9 years ago

Commit id: 64c3041db097061ed51d870c6eb8a38c9a44053a

deletions | additions      

       

To combat these sorts of attacks, one of the strategies that need to be employed is blinding; we include random data in our computations, and while the end results is independent of the random value, the intermediate values are strongly dependent, and thus the correlations between the internal states and anything that the attacker wants (such as the private key) is much weaker.  One such method of blinding Elliptic Curve calculations (first published by Coron\cite{Coron_1999}) took advantage of a property of Elliptic Curve groups; we know an integer $n$ such that $nG = 0$); Coron's method to compute $kG$ would be to select a random value $r$ and computing first $nr+k$, and then $(nr + k)G$; k)G$. Everytime we would perform a point multiplication, we would select a random $r$, and hence the bits of the integer we're giving to the point multiplication logic is independent of integer $k$ we're actually multiplying by.  However, for special form primes, this turns out not to work.  - Side channel attacks  - Scalar randomizatoin