consists in a cube and multiply exponentiation of γ.
Which means that in loop i, the random factor is
β = γ
−T
i
for some T
i
of size ∼ 3
2(`−i)
and at the end
we have β = γ
−T
for t ∼ 3
2`
.
In other words, the level of randomization is low
during the first loops of the algorithm but it grows
quickly and it is really large at the end. The lack of
randomization at the beginning can be overcome by
picking an random β and compute an equivalent Jaco-
bian coordinates R
0
0
and R
0
1
with factor β at just after
Step 1 in Algorithm 9.
5.3 Implementation Results
Our implementation are done in C using our code for
randomized and non-randomized AMNS multiplica-
tion presented in Subsection 3.3. The timings of ran-
domized scalar multiplication are reported in Table 4.
For field size 510 bits, the proposed randomization
is significantly slower, but we don’t know what is
the reason for that. But for field size 256 bits the
proposed randomization is competitive with the non-
randomized version.
Table 4: Timings of scalar multiplication.
Field and AMNS Algorithm #CC
log
2
(p) ρ n λ
510 510 2
53
10 2
co-Z Mont. Ladder 8891506
Rd. co-Z Mont. Ladder 12683841
256 256 2
57
5 2
co-Z Mont. Ladder 939424
Rd. co-Z Mont. Ladder 885270
6 CONCLUSION
In this paper we considered randomization for DSA
exponentiation and elliptic curve scalar multiplica-
tion. Our randomization take advantage of the modu-
lar multiplication in AMNS. We then presented a ran-
domized AMNS multiplication using modified poly-
nomial reduction and random choice between Bar-
rett and Montgomery multiplication. This leads to
a randomizing factor φ
−t
γ
−s
for some t ∈ {0, 1} and
s ∈ {0,... ,n − 1}. We then presented randomized
DSA exponentiation and co-Z elliptic curve scalar
multiplication using these modified AMNS multipli-
cations. This improves the level of randomization,
with, in the best case, a limited loss of performance.
REFERENCES
Bajard, J., Imbert, L., and Plantard, T. (2004). Modular
Number Systems: Beyond the Mersenne Family. In
SAC 2004, volume 3357 of LNCS, pages 159–169.
Springer.
Barrett, P. (1987). Implementing the Rivest Shamir and
Adleman Public Key Encryption Algorithm on a Stan-
dard Digital Signal Processor. In CRYPTO ’86, pages
311–323. Springer.
Brier, E., Clavier, C., and Olivier, F. (2004). Correlation
Power Analysis with a Leakage Model. In CHES
2004, volume 3156 of LNCS, pages 16–29. Springer.
Clavier, C., Feix, B., Gagnerot, G., Roussellet, M., and
Verneuil, V. (2010). Horizontal Correlation Analysis
on Exponentiation. In ICICS 2010, volume 6476 of
LNCS, pages 46–61. Springer.
Coron, J.-S. (1999). Resistance against Differential Power
Analysis for Elliptic Curve Cryptosystems. In CHES,
pages 292–302.
Didier, L.-S., Dosso, F.-Y., Mrabet, N. E., Marrez, J., and
V
´
eron, P. (2019). Randomization of arithmetic over
polynomial modular number system. In ARITH 2019,
pages 199–206. IEEE.
Goundar, R. R., Joye, M., Miyaji, A., Rivain, M., and
Venelli, A. (2011). Scalar multiplication on Weier-
straß elliptic curves from Co-Z arithmetic. J. Cryp-
togr. Eng., 1(2):161–176.
Jao, D. and Feo, L. D. (2011). Towards Quantum-Resistant
Cryptosystems from Supersingular Elliptic Curve Iso-
genies. In Post-Quantum Cryptography 2011, volume
7071 of LNCS, pages 19–34. Springer.
Joye, M. and Yen, S. (2002). The Montgomery Powering
Ladder. In CHES 2002, volume 2523 of LNCS, pages
291–302. Springer.
Kocher, P. C., Jaffe, J., and Jun, B. (1999). Differen-
tial Power Analysis. In Advances in Cryptology,
CRYPTO’99, volume 1666 of LNCS, pages 388–397.
Springer.
Lesavourey, A., N
`
egre, C., and Plantard, T. (2016). Efficient
Randomized Regular Modular Exponentiation using
Combined Montgomery and Barrett Multiplications.
In SECRYPT 2016, pages 368–375. SciTePress.
M
´
eloni, N. (2007). New Point Addition Formulae for ECC
Applications. In WAIFI 2007, volume 4547 of LNCS,
pages 189–201. Springer.
Montgomery, P. (1985). Modular Multiplication Without
Trial Division. Math. Computation, 44:519–521.
N
`
egre, C. and Plantard, T. (2008). Efficient Modular Arith-
metic in Adapted Modular Number System Using La-
grange Representation. In ACISP 2008, volume 5107
of LNCS, pages 463–477. Springer.
NIST.FIPS.186.4 (2012). Digital Signature Standad (DSS).
Standard, NIST.
Plantard, T. (2005). Arithm
´
etique modulaire pour la cryp-
tographie. PhD thesis, Montpellier 2 University,
France.
Tunstall, M. and Joye, M. (2010). Coordinate blinding over
large prime fields. In CHES 2010, volume 6225 of
LNCS, pages 443–455. Springer.
Side Channel Counter-measures based on Randomized AMNS Modular Multiplication
619