On computing the double point multiplication in elliptic curve cryptography

Abstract

The double point-multiplication (DPM) operation on elliptic curves, denoted as u.P þ v.Q, where u and v are nonnegative integers and P, Q are points on the curve, is a critical operation in digital signature verification. Its computational scheme sig- nificantly impacts system performances in terms of speed, memory usage, and security. This article introduces a range of straightforward algorithms for DPM, which leverage an iterative uniform pattern based on constant-time arithmetic. This approach mitigates side-channel attacks (SCA) that exploit tim- ing or power consumption measurements to compromise secret keys u and v. The proposed algorithms employ a w-bit windowing method to simultaneously recode the binary strings u and v and evaluate DPM on-the-fly from left-to-right. This one-pass recode/evaluation process accelerates DPM, reduces memory overhead, and enhances resilience against SCA. The new algorithms are systematically evaluated using precise ana- lytic formulas for speed, memory usage, and security. They pri- oritize simplicity and flexibility, enabling easy adjustments between speed-memory and speed-security trade-offs to meet various constraints. Comparative analysis against state-of-the- art methods is conducted, comprehensively examining com- plexities using NIST-recommended GF(2l ) curves, as well as twisted Edwards and Montgomery GF(p) curves.

Description

Keywords

Double point multiplication (DPM), Edwards curves, Elliptic curve cryptography (ECC), Elliptic curve digital signature algorithm (ECDSA)

Citation

Endorsement

Review

Supplemented By

Referenced By