Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems

被引:0
|
作者
Li, Huiyun [1 ]
Chen, Tingding [1 ]
Wu, Keke [1 ]
Yu, Fengqi [1 ]
机构
[1] Chinese Univ Hong Kong, Chinese Acad Sci, Shenzhen Inst Adv Technol, Dept Integrated Elect, Hong Kong, Hong Kong, Peoples R China
关键词
Side-channel; quantitative; security evaluation; Elliptic Curve Cryptosystems;
D O I
10.1109/ICASID.2009.5276923
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Side-channel security has aroused widespread attentions since the first publication of power analysis attack. Enormous research efforts were dedicated to new countermeasures against side-channel attacks. However, there have been very few reports about how to quantitatively verify the effectiveness. This paper presents statistical approaches of quantitative evaluation for Elliptic Curve Cryptosystems. The significance test over the difference of mean measures the distinguishability of the secret key in scalar multiplication. Experiment results demonstrate that the proposed evaluation approaches are accurate and feasible.
引用
收藏
页码:163 / 166
页数:4
相关论文
共 50 条
  • [41] Practical side-channel attack on a security device
    San Pedro, Manuel
    Servant, Victor
    Guillemet, Charles
    31ST INTERNATIONAL CONFERENCE ON MICROELECTRONICS (IEEE ICM 2019), 2019, : 130 - 133
  • [42] A tutorial on physical security and side-channel attacks
    Koeune, F
    Standaert, FX
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
  • [43] Leveraging Side-Channel Information for Disassembly and Security
    Park, Jungmin
    Rahman, Fahim
    Vassilev, Apostol T.
    Forte, Domenic
    Tehranipoor, Mark
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2020, 16 (01)
  • [44] Erratum to: Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Roberto Avanzi
    Simon Hoerder
    Dan Page
    Michael Tunstall
    Journal of Cryptographic Engineering, 2012, 2 (1) : 75 - 75
  • [45] Is it Necessary to Protect MQ-based Cryptosystems from Side-channel Attacks?
    Li, Weijian
    Yi, Haibo
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 450 - 453
  • [46] Flexible parallel computing for elliptic curve scalar multiplication with resistance against simple side-channel attacks
    Wu K.
    Wu, Keke (wukk@sziit.edu.cn), 1600, Computer Society of the Republic of China (28): : 64 - 78
  • [47] pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis
    Jancar, Jan
    Suchanek, Vojtech
    Svenda, Petr
    Sedlacek, Vladimir
    Chmielewski, Lukasz
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024 (04): : 355 - 381
  • [48] Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem
    Colombier, Brice
    Dragoi, Vlad-Florin
    Cayrel, Pierre-Louis
    Grosso, Vincent
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 3407 - 3420
  • [49] Side-Channel Evaluation Methodology on Software
    Guilley, Sylvain
    Karray, Khaled
    Perianin, Thomas
    Shrivastwa, Ritu-Ranjan
    Souissi, Youssef
    Takarabt, Sofiane
    CRYPTOGRAPHY, 2020, 4 (04) : 1 - 17
  • [50] Reconfigurable elliptic curve cryptosystems on a chip
    Cheung, RCC
    Luk, W
    Cheung, PYK
    DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION, VOLS 1 AND 2, PROCEEDINGS, 2005, : 24 - 29