Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems

被引:0
|
作者
Hasan, MA [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS | 2001年 / 1965卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Because of their shorter key sizes, cryptosystems based on elliptic curves are being increasingly used in practical applications. A special class of elliptic curves, namely, Koblitz curves, offers an additional but crucial advantage of considerably reduced processing time. In this article, power analysis attacks are applied to cryptosystems that use scalar multiplication on Koblitz curves. Both the simple and the differential power analysis attacks are considered and a number of countermeasures are suggested. While the proposed countermeasures against the simple power analysis attacks rely on making the power consumption for the elliptic curve scalar multiplication independent of the secret key, those for the differential power analysis attacks depend on randomizing the secret key prior to each execution of the scalar multiplication.
引用
收藏
页码:93 / 108
页数:16
相关论文
共 50 条
  • [21] Presilicon evaluation on Correlation Power Analysis attacks and countermeasures
    Damian, B. M.
    Hascsi, Z.
    Sandulescu, A. B.
    2017 IEEE 23RD INTERNATIONAL SYMPOSIUM FOR DESIGN AND TECHNOLOGY IN ELECTRONIC PACKAGING (SIITME), 2017, : 313 - 317
  • [22] Patents in power analysis attacks and their countermeasures for cryptographic devices
    Muresan R.
    Recent Patents on Electrical Engineering, 2010, 3 (03) : 177 - 185
  • [23] A New Variant Nevine Maurice Ebied's Key Randomization Counter Measures to Power Analysis Attacks on Elliptic Curve Cryptosystems
    Reddy, E. Kesavulu
    Prasad, V. V. Lakshmi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 446 - 455
  • [24] Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
    Kim, Tae Hyun
    Takagi, Tsuyoshi
    Han, Dong-Guk
    Kim, He Won
    Lim, Jongin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 168 - +
  • [25] Demystifying elliptic curve cryptography : Curve selection, implementation and countermeasures to attacks
    Dhanda, Sumit Singh
    Singh, Brahmjit
    Jindal, Poonam
    JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2020, 23 (02) : 463 - 470
  • [26] Power Analysis Side Channel Attacks and Countermeasures for the Internet of Things
    Liptak, Christopher
    Mal-Sarkar, Sanchita
    Kumar, Sathish A. P.
    2022 IEEE PHYSICAL ASSURANCE AND INSPECTION OF ELECTRONICS (PAINE), 2022, : 58 - 64
  • [27] Experiments on Two Clock Countermeasures Against Power Analysis Attacks
    Menicocci, Renato
    Trifiletti, Alessandro
    Trotta, Francesco
    2014 PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON MIXED DESIGN OF INTEGRATED CIRCUITS & SYSTEMS (MIXDES), 2014, : 215 - 219
  • [28] Research on Circuit Level Countermeasures for Differential Power Analysis Attacks
    Wu, Di
    Cui, Xiaoxin
    Wei, Wei
    Li, Rui
    Yu, Dunshan
    Cui, Xiaole
    2012 IEEE 11TH INTERNATIONAL CONFERENCE ON SOLID-STATE AND INTEGRATED CIRCUIT TECHNOLOGY (ICSICT-2012), 2012, : 1446 - 1448
  • [29] Implementation of power attack analysis in ML algorithm circuit with elliptic curve cryptosystems
    Han, Yu
    Zou, Xuecheng
    Liu, Zhenglin
    Dan, Yongping
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (02): : 21 - 24
  • [30] Analysis of phishing attacks and countermeasures
    Issac, Biju
    Chiong, Raymond
    Jacob, Seibu Mary
    MANAGING INFORMATION IN THE DIGITAL ECONOMY: ISSUES & SOLUTIONS, 2006, : 339 - +