Residue Number System as a Side Channel and Fault Injection Attack countermeasure in Elliptic Curve Cryptography

被引:0
|
作者
Fournaris, Apostolos P. [1 ]
Papachristodoulou, Louiza [2 ]
Batina, Lejla [2 ]
Sklavos, Nicolas [1 ]
机构
[1] Univ Patras, Comp Engn & Informat Dept, GR-26110 Patras, Greece
[2] Radboud Univ Nijmegen, Digital Secur Grp, NL-6525 ED Nijmegen, Netherlands
关键词
RESISTANT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Implementation attacks and more specifically Power Analysis (PA) (the dominant type of side channel attack) and fault injection (FA) attacks constitute a pragmatic hazard for scalar multiplication, the main operation behind Elliptic Curve Cryptography. There exists a wide variety of countermeasures attempting to thwart such attacks that, however, few of them explore the potential of alternative number systems like the Residue Number System (RNS). In this paper, we explore the potential of RNS as an PA-FA countermeasure and propose an PA-FA resistant scalar multiplication algorithm and provide an extensive security analysis against the most effective PA-FA techniques. We argue through a security analysis that combining traditional PA-FA countermeasures with lightweight RNS countermeasures can provide strong PA-FA resistance.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] Buffer overflow attack with multiple fault injection and a proven countermeasure
    Nashimoto S.
    Homma N.
    Hayashi Y.-I.
    Takahashi J.
    Fuji H.
    Aoki T.
    [J]. Journal of Cryptographic Engineering, 2017, 7 (1) : 35 - 46
  • [32] An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure
    Endo, Sho
    Homma, Naofumi
    Hayashi, Yu-ichi
    Takahashi, Junko
    Fuji, Hitoshi
    Aoki, Takafumi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 171 - 181
  • [33] Power-based Side Channel Analysis and Fault Injection: Hacking Techniques and Combined Countermeasure
    Benhadjyoussef, Noura
    Karmani, Mouna
    Machhout, Mohsen
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 709 - 719
  • [34] Safe and Effective Elliptic Curve Cryptography Algorithm against Energy Attack
    Yao, Jianbo
    Yang, Chaoqiong
    Zhang, Tao
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, BIG DATA AND ALGORITHMS (EEBDA), 2022, : 1313 - 1316
  • [35] A Side Channel Attack Countermeasure using System-On-Chip Power Profile Scrambling
    Krieg, Armin
    Grinschgl, Johannes
    Steger, Christian
    Weiss, Reinhold
    Haid, Josef
    [J]. 2011 IEEE 17TH INTERNATIONAL ON-LINE TESTING SYMPOSIUM (IOLTS), 2011,
  • [36] A Novel and Efficient countermeasure against Power Analysis Attacks using Elliptic Curve Cryptography
    Prabu, M.
    Shanmugalakshmi, R.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2010, 1 (02) : 17 - 21
  • [37] Function Masking: A New Countermeasure Against Side Channel Attack
    Kim, Taesung
    Ahn, Sungjun
    Lee, Seungkwang
    Choi, Dooho
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2014, 2015, 8909 : 331 - 342
  • [38] Fault attack on elliptic curve with Montgomery ladder implementation
    Fouque, Pierre-Alain
    Real, Denis
    Lercier, Reynald
    Valette, Fredric
    [J]. FDTC 2008: FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY, PROCEEDINGS, 2008, : 92 - +
  • [39] Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based Cryptography
    El Mrabet, Nadia
    Fouotsa, Emmanuel
    [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 259 - 273
  • [40] Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip
    Wang, Xiang
    Wang, Liping
    Bai, Yuanchen
    He, Zhenxue
    Wang, Tao
    Xu, Bin
    Zhang, He
    Wang, Xiaocui
    Zhou, Cheng
    Wang, Weike
    Du, Pei
    [J]. IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1397 - 1401