An Efficient Method against Side-Channel Attacks on ECC

被引:0
|
作者
LIU Shuanggen~ 1
2. College of Computer Information Engineering
机构
关键词
side-channel attacks; ECC; scalar multiplication algorithm;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
Side-channel attacks(SCA) may exploit leakage information to break cryptosystems. In this paper we present a new SCA resistant Elliptic Curve scalar multiplication algorithm. The proposed algorithm, builds a sequence of bit-strings representing the scalar k, characterized by the fact that all bit-strings are different from zero; this property will ensure a uniform computation behavior for the algorithm, and thus will make it secure against simple power analysis attacks(SPA). With other randomization techniques, the proposed countermeasures do not penalize the computation time. The proposed scheme is more efficient than Mller’s one, its cost being about 5% to 10% smaller than Mller’s one.
引用
收藏
页码:1573 / 1576
页数:4
相关论文
共 50 条
  • [1] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03) : 471 - 475
  • [2] GALS Design of ECC Against Side-Channel Attacks - A Comparative Study
    Fan, Xin
    Peter, Steffen
    Krstic, Milos
    [J]. 2014 24TH INTERNATIONAL WORKSHOP ON POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION (PATMOS), 2014,
  • [3] Error Detection and Recovery for ECC: A New Approach Against Side-Channel Attacks
    Ma, Kun
    Wu, Kaijie
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (04) : 627 - 637
  • [4] ECC Atomic Block against Strong Side-Channel Attacks using Binary Curves
    Takemura, Yusuke
    Hakuta, Keisuke
    Shinohara, Naoyuki
    [J]. 2019 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2019), 2019, : 387 - 393
  • [5] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [6] Energy Efficient Obfuscation of Side-Channel Leakage for Preventing Side-Channel Attacks
    Jin, Shan
    Xu, Minghua
    Cai, Yiwei
    [J]. 39TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2024, 2024, : 1405 - 1414
  • [7] Compositional Verification of Efficient Masking Countermeasures against Side-Channel Attacks
    Gao, Pengfei
    Zhang, Yedi
    Song, Fu
    Chen, Taolue
    Standaert, Francois-Xavier
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2023, 7 (OOPSLA):
  • [8] On the Correctness of an Approach against Side-Channel Attacks
    Wang, Peng
    Feng, Dengguo
    Wu, Wenling
    Zhang, Liting
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 336 - +
  • [9] Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations
    Nascimento, Erick
    Chmielewski, Lukasz
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2017), 2018, 10728 : 213 - 231
  • [10] Countermeasure of ECC against Side-channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    [J]. 2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 465 - 469