Side-Channel Vulnerabilities of Unified Point Addition on Binary Huff Curve and Its Countermeasure

被引:6
|
作者
Cho, Sung Min [1 ]
Jin, Sunghyun [1 ]
Kim, Heeseok [2 ]
机构
[1] Korea Univ, CIST, Seoul 02841, South Korea
[2] Korea Univ, Coll Sci & Technol, Dept Cyber Secur, Sejong 30019, South Korea
来源
APPLIED SCIENCES-BASEL | 2018年 / 8卷 / 10期
基金
新加坡国家研究基金会;
关键词
unified point addition; binary Huff curve; recovery of secret exponent by triangular trace analysis; horizontal collision correlation analysis;
D O I
10.3390/app8102002
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Unified point addition for computing elliptic curve point addition and doubling is considered to be resistant to simple power analysis. Recently, new side-channel attacks, such as recovery of secret exponent by triangular trace analysis and horizontal collision correlation analysis, have been successfully applied to elliptic curve methods to investigate their resistance to side-channel attacks. These attacks turn out to be very powerful since they only require leakage of a single power consumption trace. In this paper, using these side-channel attack analyses, we introduce two vulnerabilities of unified point addition on the binary Huff curve. Also, we propose a new unified point addition method for the binary Huff curve. Furthermore, to secure against these vulnerabilities, we apply an equivalence class to the side-channel atomic algorithm using the proposed unified point addition method.
引用
收藏
页数:23
相关论文
共 50 条
  • [21] Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers
    Xu, Chuanqi
    Erata, Ferhat
    Szefer, Jakub
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 579 - 593
  • [22] A New Countermeasure against Scan-Based Side-Channel Attacks
    Luo, Yanhui
    Cui, Aijiao
    Qu, Gang
    Li, Huawei
    2016 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2016, : 1722 - 1725
  • [23] Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
    Bhasin, Shivam
    Guilley, Sylvain
    Sauvage, Laurent
    Danger, Jean-Luc
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 195 - 207
  • [24] First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
    Prouff, Emmanuel
    McEvoy, Robert
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 81 - 96
  • [25] Key Update Countermeasure for Correlation-Based Side-Channel Attacks
    Yutian Gui
    Suyash Mohan Tamore
    Ali Shuja Siddiqui
    Fareena Saqib
    Journal of Hardware and Systems Security, 2020, 4 (3) : 167 - 179
  • [26] Power Profile Equalizer: a Lightweight Countermeasure against Side-channel Attack
    Wang, Chenguang
    Yan, Ming
    Cai, Yici
    Zhou, Qiang
    Yang, Jianlei
    2017 IEEE 35TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD), 2017, : 305 - 312
  • [27] Electromagnetic Equalizer: An Active Countermeasure Against EM Side-channel Attack
    Wang, Chenguang
    Cai, Yici
    Wang, Haoyi
    Zhou, Qiang
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD) DIGEST OF TECHNICAL PAPERS, 2018,
  • [28] All-or-Nothing Transforms as a countermeasure to differential side-channel analysis
    McEvoy, Robert P.
    Tunstall, Michael
    Whelan, Claire
    Murphy, Colin C.
    Marnane, William P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (03) : 291 - 304
  • [29] AES side-channel countermeasure using random tower field constructions
    Bonnecaze, Alexis
    Liardet, Pierre
    Venelli, Alexandre
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 69 (03) : 331 - 349
  • [30] Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures
    Pessl, Peter
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 153 - 170