橢圓曲線加密系統 (ECC) 因為其使用較短長度的金鑰就可達到與傳統公開金鑰加密系統相同的安全性,故已經被應用在許多資源限制的環境裡。然而,簡單功率分析攻擊 (SPA) 和差分功率分析攻擊 (DPA) 這類利用 ECC 功率的旁通道攻擊 (SCA) 會使加密私鑰的內容被洩漏出來。為了對抗功率分析,近年來已有許多研究提出對抗方法,像是參考文獻[1]、[2]和[3]。在此篇論文中,我們藉由設計純量乘法演算法以及修改點運算的數學計算方式提出對抗功率分析的方法。與文獻所提出的方法比較得知我們提出的方法在運算時間上更有效率。
Elliptic curve cryptosystem (ECC) has been applied to many resource constraint environments because it requires shorter keys than traditional public-key cryptography systems in equal security level. However, the secret keys may be disclosed by side channel attacks (SCA) such as simple power analysis (SPA) and the differential power analysis (DPA) that exploit the power consumption of ECC devices. To oppose power analysis, many countermeasures have been proposed in recent years like [1], [2], and [3]. In this thesis, we propose some scalar multiplication methods with resistance against SPA and DPA by devising the scalar multiplication algorithm and modifying the arithmetic of point operations on the finite field . Compared with the Double-and-Add-Always scalar multiplication algorithm and Binary Expansion with Random Initial Point (BRIP), our countermeasures are efficient in terms of computation time.