Residue Number System as a Side Channel and Fault Injection Attack countermeasure in Elliptic Curve Cryptography

被引:0
|
作者
Fournaris, Apostolos P. [1 ]
Papachristodoulou, Louiza [2 ]
Batina, Lejla [2 ]
Sklavos, Nicolas [1 ]
机构
[1] Univ Patras, Comp Engn & Informat Dept, GR-26110 Patras, Greece
[2] Radboud Univ Nijmegen, Digital Secur Grp, NL-6525 ED Nijmegen, Netherlands
关键词
RESISTANT;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Implementation attacks and more specifically Power Analysis (PA) (the dominant type of side channel attack) and fault injection (FA) attacks constitute a pragmatic hazard for scalar multiplication, the main operation behind Elliptic Curve Cryptography. There exists a wide variety of countermeasures attempting to thwart such attacks that, however, few of them explore the potential of alternative number systems like the Residue Number System (RNS). In this paper, we explore the potential of RNS as an PA-FA countermeasure and propose an PA-FA resistant scalar multiplication algorithm and provide an extensive security analysis against the most effective PA-FA techniques. We argue through a security analysis that combining traditional PA-FA countermeasures with lightweight RNS countermeasures can provide strong PA-FA resistance.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Elliptic Curve Cryptography For EAACK Intrusion Detection System
    Save, Tejas
    Chhatani, Reeta
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 355 - 359
  • [42] Reconfigurable real number field elliptic curve cryptography to improve the security
    Goo E.-H.
    Lee S.-D.
    [J]. Journal of Computer Virology and Hacking Techniques, 2015, 11 (3) : 123 - 128
  • [43] Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure
    Fukushima, Kazuhide
    Xu, Rui
    Kiyomoto, Shinsaku
    Homma, Naofumi
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1032 - 1037
  • [44] On the Design and Optimization of a Quantum Polynomial-Time Attack on Elliptic Curve Cryptography
    Cheung, Donny
    Maslov, Dmitri
    Mathew, Jimson
    Pradhan, Dhiraj K.
    [J]. THEORY OF QUANTUM COMPUTATION, COMMUNICATION, AND CRYPTOGRAPHY, 2008, 5106 : 96 - +
  • [45] Implementation of Pollard Rho Attack on Elliptic Curve Cryptography over Binary Fields
    Wienardo
    Yuliawan, Fajar
    Muchtadi-Alamsyah, Intan
    Rahardjo, Budi
    [J]. 5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND NATURAL SCIENCES (ICMNS 2014), 2015, 1677
  • [46] Side-channel Attack Countermeasure Based on Power Supply Modulation
    Jevtic, Ruzica
    Perez-Tirador, Pablo
    Cabezaolias, Carmen
    Carnero, Pablo
    Caffarena, Gabriel
    [J]. 2022 30TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO 2022), 2022, : 618 - 622
  • [47] Side Channel Attack Countermeasure for Low Power Devices with AES Encryption
    Ruminot-Ahumada, Nicolas
    Valencia-Cordero, Claudio
    Abarzua-Ortiz, Rodrigo
    [J]. 2021 IEEE IFAC INTERNATIONAL CONFERENCE ON AUTOMATION/XXIV CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (IEEE IFAC ICA - ACCA2021), 2021,
  • [48] Novel Fault Attack Resistant Elliptic Curve Processor Architecture
    Zode, Pravin P.
    Deshmukh, R. B.
    [J]. 2014 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2014,
  • [49] A Novel Approach Cryptography by using Residue Number System
    Navin, Ahmad Habibizad
    Oskuei, Amin Rahimi
    Khashandarag, Asghar Shahrzad
    Mirnia, Mirkamal
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 636 - 639
  • [50] Side-channel aware design:: Algorithms and architectures for elliptic curve cryptography over GF(2n)
    Batina, L
    Mentens, N
    Preneel, B
    Verbauwhede, I
    [J]. 16TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURE AND PROCESSORS, PROCEEDINGS, 2005, : 350 - 355