Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems

被引:0
|
作者
Hasan, MA [1 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
来源
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS-CHES 2000, PROCEEDINGS | 2001年 / 1965卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Because of their shorter key sizes, cryptosystems based on elliptic curves are being increasingly used in practical applications. A special class of elliptic curves, namely, Koblitz curves, offers an additional but crucial advantage of considerably reduced processing time. In this article, power analysis attacks are applied to cryptosystems that use scalar multiplication on Koblitz curves. Both the simple and the differential power analysis attacks are considered and a number of countermeasures are suggested. While the proposed countermeasures against the simple power analysis attacks rely on making the power consumption for the elliptic curve scalar multiplication independent of the secret key, those for the differential power analysis attacks depend on randomizing the secret key prior to each execution of the scalar multiplication.
引用
收藏
页码:93 / 108
页数:16
相关论文
共 50 条
  • [31] On countermeasures to traffic analysis attacks
    Fu, XW
    Graham, B
    Bettati, R
    Zhao, W
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 188 - 195
  • [32] Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
    Lee, Mun-Kyu
    Song, Jeong Eun
    Choi, Dooho
    Han, Dong-Guk
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (01) : 153 - 163
  • [33] Chosen Message Side-channel Attacks against Elliptic Curve Cryptosystems
    Xiong Liying
    Wang, Yu
    Li, Huiyun
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 172 - +
  • [34] Analysis of Countermeasures Against Remote and Local Power Side Channel Attacks using Correlation Power Analysis
    Mozipo, Aurelien T.
    Acken, John M.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5128 - 5142
  • [35] Defeating simple power analysis on Koblitz curves
    Vuillaume, Camille
    Okeya, Katsuyuki
    Takagi, Tsuyoshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (05) : 1362 - 1369
  • [36] Further Heuristic Discussion on Two Countermeasures against Reaction Attacks on McEliece Cryptosystems with QCLDPC Codes
    Farkas, P.
    2019 EIGHTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2019,
  • [37] Current Balancing Random Body Bias in FDSOI Cryptosystems as a Countermeasure to Leakage Power Analysis Attacks
    Palma, Kenneth
    Moll, Francesc
    IEEE ACCESS, 2022, 10 (13451-13459) : 13451 - 13459
  • [38] Analysis of Cloud Computing Attacks and Countermeasures
    Jabir, Raja Mohamed
    Khanji, Salam Ismail Rasheed
    Ahmad, Liza Abdallah
    Alfandi, Omar
    Said, Huwida
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 117 - 123
  • [39] An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures
    AbdulGhaffar, AbdulAziz
    Paul, Sumit Kumar
    Matrawy, Ashraf
    2023 BIENNIAL SYMPOSIUM ON COMMUNICATIONS, BSC, 2023, : 119 - 124
  • [40] Attacks and Countermeasures on 802.16: Analysis and Assessment
    Kolias, Constantinos
    Kambourakis, Georgios
    Gritzalis, Stefanos
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (01): : 487 - 514