Retourner au contenu. Retourner à la navigation
Actions sur le document

PhD Defense of Jérémy Métairie

Par tisseranDernière modification 02/06/2016 09:02

Title: Contributions to GF(2^m) arithmetic operators for elliptic curve cryptography

Date:    May 19th, 2016, 14h00

Place:  Lannion, IRISA, ENSSAT - University Rennes 1

PhD Summary

Cryptography and security market is growing up at an annual rate of 17% according to some recent studies. Cryptography is known to be the science of secret. It is based on mathematical hard problems as integers factorization, the well-known discrete logarithm problem. Although those problems are trusted, software or hardware implementations of cryptographic algorithms can suffer from inherent weaknesses. Execution time, power consumption (...) can differ depending on secret informations such as the secret key. Because of that, some malicious attacks could be used to exploit these weak points and therefore can be used to break the whole crypto-system. In this thesis, we are interested in protecting our physical device from the so called side channel attacks as well as interested in proposing new GF(2^m) multiplication algorithms used over elliptic curves cryptography. As a protection, we first thought that parallel scalar multiplication (using halve-and-add and double-and-add algorithms both executed at the same time) would be a great countermeasure against template attacks. We showed that it was not the case and that parallelism could not be used as protection by itself : it had to be combined with more conventional countermeasures. We also proposed two new GF(2m ) representations we respectively named permuted normal basis (PNB) and Phi-RNS. Those two representations, under some requirements, can offer a great time-area trade-off on

Thesis access (PDF)

Funding:  this PhD Thesis was funded by PAVOIS project.