Side-Channel Vulnerabilities of Unified Point Addition on Binary Huff Curve and Its Countermeasure

被引:6
|
作者
Cho, Sung Min [1 ]
Jin, Sunghyun [1 ]
Kim, Heeseok [2 ]
机构
[1] Korea Univ, CIST, Seoul 02841, South Korea
[2] Korea Univ, Coll Sci & Technol, Dept Cyber Secur, Sejong 30019, South Korea
来源
APPLIED SCIENCES-BASEL | 2018年 / 8卷 / 10期
基金
新加坡国家研究基金会;
关键词
unified point addition; binary Huff curve; recovery of secret exponent by triangular trace analysis; horizontal collision correlation analysis;
D O I
10.3390/app8102002
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Unified point addition for computing elliptic curve point addition and doubling is considered to be resistant to simple power analysis. Recently, new side-channel attacks, such as recovery of secret exponent by triangular trace analysis and horizontal collision correlation analysis, have been successfully applied to elliptic curve methods to investigate their resistance to side-channel attacks. These attacks turn out to be very powerful since they only require leakage of a single power consumption trace. In this paper, using these side-channel attack analyses, we introduce two vulnerabilities of unified point addition on the binary Huff curve. Also, we propose a new unified point addition method for the binary Huff curve. Furthermore, to secure against these vulnerabilities, we apply an equivalence class to the side-channel atomic algorithm using the proposed unified point addition method.
引用
收藏
页数:23
相关论文
共 50 条
  • [1] Unified point addition formulae and side-channel attacks
    Stebila, Douglas
    Theriault, Nicolas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 354 - 368
  • [2] Countermeasure of ECC against Side-channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 465 - 469
  • [3] An Efficient Crypto Processor Architecture for Side-Channel Resistant Binary Huff Curves on FPGA
    Umer, Usama
    Rashid, Muhammad
    Alharbi, Adel R.
    Alhomoud, Ahmed
    Kumar, Harish
    Jafri, Atif Raza
    ELECTRONICS, 2022, 11 (07)
  • [4] Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure
    Yen, Sung-Ming
    Chen, Chien-Ning
    Moon, SangJae
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (02) : 99 - 110
  • [5] Evaluating the ROCKY Countermeasure for Side-Channel Leakage
    Miteloudi, Konstantina
    Chmielewski, Lukasz
    Batina, Lejla
    Mentens, Nele
    PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 212 - 217
  • [6] Analyzing Side-Channel Attack Vulnerabilities at RTL
    Lai, Xinhui
    Jenihhin, Maksim
    2023 IEEE 24TH LATIN AMERICAN TEST SYMPOSIUM, LATS, 2023,
  • [7] Countermeasure for cryptographic chips to resist side-channel attacks
    Zhang, Tao
    Fan, Ming-Yu
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (11): : 2990 - 2998
  • [8] Toward an Optimal Countermeasure for Cache Side-Channel Attacks
    Shrivastava, Nivedita
    Sarangi, Smruti R.
    IEEE EMBEDDED SYSTEMS LETTERS, 2023, 15 (03) : 141 - 144
  • [9] Shuffling Based Side-Channel Countermeasure for Energy Harvester
    Nozaki, Yusuke
    Yoshikawa, Masaya
    2018 IEEE 7TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE 2018), 2018, : 714 - 715
  • [10] Neural Networks as a Side-Channel Countermeasure: Challenges and Opportunities
    Krautter, Jonas
    Tahoori, Mehdi B.
    2021 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2021), 2021, : 272 - 277