Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems

被引:0
|
作者
Li, Huiyun [1 ]
Chen, Tingding [1 ]
Wu, Keke [1 ]
Yu, Fengqi [1 ]
机构
[1] Chinese Univ Hong Kong, Chinese Acad Sci, Shenzhen Inst Adv Technol, Dept Integrated Elect, Hong Kong, Hong Kong, Peoples R China
关键词
Side-channel; quantitative; security evaluation; Elliptic Curve Cryptosystems;
D O I
10.1109/ICASID.2009.5276923
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Side-channel security has aroused widespread attentions since the first publication of power analysis attack. Enormous research efforts were dedicated to new countermeasures against side-channel attacks. However, there have been very few reports about how to quantitatively verify the effectiveness. This paper presents statistical approaches of quantitative evaluation for Elliptic Curve Cryptosystems. The significance test over the difference of mean measures the distinguishability of the secret key in scalar multiplication. Experiment results demonstrate that the proposed evaluation approaches are accurate and feasible.
引用
收藏
页码:163 / 166
页数:4
相关论文
共 50 条
  • [1] Chosen Message Side-channel Attacks against Elliptic Curve Cryptosystems
    Xiong Liying
    Wang, Yu
    Li, Huiyun
    [J]. 2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 172 - +
  • [2] Quantitative Evaluation of Side-channel Security
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    [J]. 2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 456 - 460
  • [3] Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 155 - 158
  • [4] Reactive side-channel countermeasures: Applicability and quantitative security evaluation
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2018, 62 : 50 - 60
  • [5] The Jacobi model of an elliptic curve and side-channel analysis
    Billet, O
    Joye, M
    [J]. APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 34 - 42
  • [6] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    [J]. INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [7] Faster Side-Channel Resistant Elliptic Curve Scalar Multiplication
    Venelli, Alexandre
    Dassance, Francois
    [J]. ARITHMETIC, GEOMETRY, CRYPTOGRAPHY AND CODING THEORY 2009, 2010, 521 : 29 - +
  • [8] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao~1
    2.School of Computer Science & Engineering
    3.School of Electronic Engineering
    [J]. Journal of Systems Engineering and Electronics, 2009, 20 (03) : 660 - 665
  • [9] Secure and efficient elliptic curve cryptography resists side-channel attacks
    Zhang Tao
    Fan Mingyu
    Zheng Xiaoyu
    [J]. JOURNAL OF SYSTEMS ENGINEERING AND ELECTRONICS, 2009, 20 (03) : 660 - 665
  • [10] A General Framework of Side-Channel Atomicity for Elliptic Curve Scalar Multiplication
    Lu, Chia-Yu
    Jen, Shang-Ming
    Laih, Chi-Sung
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (03) : 428 - 438