Side-Channel Vulnerabilities of Unified Point Addition on Binary Huff Curve and Its Countermeasure

被引:6
|
作者
Cho, Sung Min [1 ]
Jin, Sunghyun [1 ]
Kim, Heeseok [2 ]
机构
[1] Korea Univ, CIST, Seoul 02841, South Korea
[2] Korea Univ, Coll Sci & Technol, Dept Cyber Secur, Sejong 30019, South Korea
来源
APPLIED SCIENCES-BASEL | 2018年 / 8卷 / 10期
基金
新加坡国家研究基金会;
关键词
unified point addition; binary Huff curve; recovery of secret exponent by triangular trace analysis; horizontal collision correlation analysis;
D O I
10.3390/app8102002
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Unified point addition for computing elliptic curve point addition and doubling is considered to be resistant to simple power analysis. Recently, new side-channel attacks, such as recovery of secret exponent by triangular trace analysis and horizontal collision correlation analysis, have been successfully applied to elliptic curve methods to investigate their resistance to side-channel attacks. These attacks turn out to be very powerful since they only require leakage of a single power consumption trace. In this paper, using these side-channel attack analyses, we introduce two vulnerabilities of unified point addition on the binary Huff curve. Also, we propose a new unified point addition method for the binary Huff curve. Furthermore, to secure against these vulnerabilities, we apply an equivalence class to the side-channel atomic algorithm using the proposed unified point addition method.
引用
收藏
页数:23
相关论文
共 50 条
  • [31] All-or-Nothing Transforms as a countermeasure to differential side-channel analysis
    Robert P. McEvoy
    Michael Tunstall
    Claire Whelan
    Colin C. Murphy
    William P. Marnane
    International Journal of Information Security, 2014, 13 : 291 - 304
  • [32] Attacking and Securing the Clock Randomization and Duplication Side-Channel Attack Countermeasure
    Brisfors, Martin
    Moraitis, Michail
    Landin, Gabriel Klasson
    Jilborg, Truls
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 372 - 387
  • [33] Side-channel attack countermeasure evaluation of cryptographic hardware implementation circuit
    Asai, Toshiya
    Asahi, Kensaku
    Shiozaki, Mitsuru
    Fujino, Takeshi
    Yoshikawa, Masaya
    IEEJ Transactions on Electronics, Information and Systems, 2014, 134 (12) : 1767 - 1774
  • [34] AES side-channel countermeasure using random tower field constructions
    Alexis Bonnecaze
    Pierre Liardet
    Alexandre Venelli
    Designs, Codes and Cryptography, 2013, 69 : 331 - 349
  • [35] Late Breaking Results: Configurable Ring Oscillators as a Side-Channel Countermeasure
    Nassar, Hassan
    Pankner, Simon
    Bauer, Lars
    Henkel, Joerg
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [36] Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature
    Fukushima, Kazuhide
    Okada, Hiroki
    Takarabt, Sofiane
    Korchi, Amina
    Hamoud, Meziane
    Karray, Khaled
    Souissy, Youssef
    Guilley, Sylvain
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 701 - 706
  • [37] The Jacobi model of an elliptic curve and side-channel analysis
    Billet, O
    Joye, M
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 34 - 42
  • [38] CACHEQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software
    Yuan, Yuanyuan
    Liu, Zhibo
    Wang, Shuai
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2009 - 2026
  • [39] Automatic Repair of Java']Java Code with Timing Side-Channel Vulnerabilities
    Lima, Rui
    Ferreira, Joao F.
    Mendes, Alexandra
    2021 36TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2021), 2021, : 1 - 8
  • [40] DifFuzzAR: automatic repair of timing side-channel vulnerabilities via refactoring
    Rui Lima
    João F. Ferreira
    Alexandra Mendes
    Carolina Carreira
    Automated Software Engineering, 2024, 31