Side Channel Attack Resistant Architecture for Elliptic Curve Cryptography

被引:0
|
作者
Zode, Pravin [1 ]
Deshmukh, Raghavendra B. [1 ]
机构
[1] Visvesvaraya Natl Inst Technol, Ctr VLSI & Nano Technol, Nagpur, Maharashtra, India
关键词
Elliptic Curve Cryptography; Side Channel Attack; Fault Attack; Power Analysis;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the widespread use of applications like internet banking, secured communication, emails, etc. information security is important concern. Security of information depends on implementation of cryptographic algorithm and its complexity to solve in reverse direction. However, with the use of current high speed computational resources it is possible to carry out brute-force attack and various other techniques like analyzing power, temperature, timing information. Therefore, cryptosystems are always under the threat of attacks. Elliptic Curve Cryptography is system based on the theory of elliptic curves. It is very promising technique as it offers better security with shorter key length compared to other contemporary techniques of encryption like AES, RSA etc. It is widely accepted that 160-bit ECC offers equivalent security as of 1024-bit RSA. This feature makes ECC attractive for constrained based devices where less power and storage and computing is required. FPGAs are suitable platform for implementing the cryptosystem as they provides rapid prototyping. However, hardware implementation of crypto algorithm can leak secret information through side channel attacks considerably weakens the system security. Typically, power consumption, timing information, electromagnetic information or inserting faults adversary can analyze the system. The proposed work focuses on to avoid the attacker from gaining the secret information from the system. This is done inserting noise, redundant computations or by false random traces and with focus on tradeoff of VLSI design i. e. Power, Area and Delay.
引用
收藏
页数:2
相关论文
共 50 条
  • [1] Novel fault attack resistant architecture for elliptic curve cryptography
    Zode, Pravin
    Deshmukh, Raghavendra
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2021, 84
  • [2] Evolving Side-Channel Resistant Reconfigurable Hardware for Elliptic Curve Cryptography
    Poudel, Bikash
    Louis, Sushil J.
    Munir, Arslan
    [J]. 2017 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2017, : 2428 - 2436
  • [3] Residue Number System as a Side Channel and Fault Injection Attack countermeasure in Elliptic Curve Cryptography
    Fournaris, Apostolos P.
    Papachristodoulou, Louiza
    Batina, Lejla
    Sklavos, Nicolas
    [J]. 2016 11TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS), 2016,
  • [4] Architecture for an elliptic curve scalar multiplication resistant to some side-channel attacks
    Yoon, JC
    Jung, SW
    Lee, S
    [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 139 - 151
  • [5] Implementing Curve25519 for Side-Channel-Protected Elliptic Curve Cryptography
    Sasdrich, Pascal
    Gueneysu, Tim
    [J]. ACM TRANSACTIONS ON RECONFIGURABLE TECHNOLOGY AND SYSTEMS, 2015, 9 (01)
  • [6] Novel Fault Attack Resistant Elliptic Curve Processor Architecture
    Zode, Pravin P.
    Deshmukh, R. B.
    [J]. 2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [7] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao
    Fan Mingyu
    Zheng Xiaoyu
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 20 (03) : 660 - 665
  • [8] Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 155 - 158
  • [9] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao~1
    2.School of Computer Science & Engineering
    3.School of Electronic Engineering
    [J]. Journal of Systems Engineering and Electronics, 2009, 20 (03) : 660 - 665
  • [10] Profiling Attack on Modular Multiplication of Elliptic Curve Cryptography
    Jiang, Kun
    Zhao, Bing
    Shan, Weijun
    Wang, Lihui
    Liu, Jing
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 233 - 236