Countermeasure of ECC against Side-channel Attacks: Balanced Point Addition and Point Doubling Operation Procedure

被引:3
|
作者
Chen, Tingding [1 ]
Li, Huiyun [1 ]
Wu, Keke [1 ]
Yu, Fengqi [1 ]
机构
[1] Chinese Univ Hong Kong, Chinese Acad Sci, Dept Integrated Elect, Shenzhen Inst Adv & Technol, Shenzhen, Peoples R China
来源
2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS | 2009年
关键词
Elliptic Curve Cryptography (ECC); point doubling and addition; side-channel attacks (SCAs); power analysis; balanced procedure; LOGIC;
D O I
10.1109/APCIP.2009.250
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic Curve Cryptography (ECC) has become widely deployed in embedded cryptographic devices. However, power analysis attacks may retrieve secret keys by exploiting the power consumption of ECC devices. This paper proposes a countermeasure with balanced operation procedure of point doubling, and addition during the scalar multiplication implementation of ECC algorithms. Experiment results on smart cards demonstrate this balanced method can largely enhance the secure against side-channel attacks.
引用
收藏
页码:465 / 469
页数:5
相关论文
共 34 条
  • [1] Efficient Solution to Secure ECC Against Side-channel Attacks
    Wu Keke
    Li Huiyun
    Zhu Dingju
    Yu Fengqi
    CHINESE JOURNAL OF ELECTRONICS, 2011, 20 (03): : 471 - 475
  • [2] Error Detection and Recovery for ECC: A New Approach Against Side-Channel Attacks
    Ma, Kun
    Wu, Kaijie
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2014, 33 (04) : 627 - 637
  • [3] Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks
    Bhasin, Shivam
    Guilley, Sylvain
    Sauvage, Laurent
    Danger, Jean-Luc
    TOPICS IN CRYPTOLOGY - CT-RSA 2010, PROCEEDINGS, 2010, 5985 : 195 - 207
  • [4] Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks
    Barbu, Guillaume
    Battistello, Alberto
    INFORMATION SECURITY THEORY AND PRACTICE, WISTP 2016, 2016, 9895 : 153 - 168
  • [5] A statistical verification method of random permutations for hiding countermeasure against side-channel attacks
    Park, Jong-Yeon
    Ju, Jang-Won
    Lee, Wonil
    Kang, Bo Gyeong
    Kachi, Yasuyuki
    Sakurai, Kouichi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
  • [6] QuadSeal: Quadruple Algorithmic Symmetrizing Countermeasure Against Power Based Side-channel Attacks
    Jayasinghe, Darshana
    Ignjatovic, Aleksandar
    Ambrose, Jude Angelo
    Ragel, Roshan
    Parameswaran, Sri
    2015 INTERNATIONAL CONFERENCE ON COMPILERS, ARCHITECTURE AND SYNTHESIS FOR EMBEDDED SYSTEMS (CASES), 2015, : 21 - 30
  • [7] Fast Side-Channel Security Evaluation of ECC Implementations Shortcut Formulas for Horizontal Side-Channel Attacks Against ECSM with the Montgomery Ladder
    Azouaoui, Melissa
    Poussier, Romain
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 25 - 42
  • [8] First-Order Side-Channel Attacks on the Permutation Tables Countermeasure
    Prouff, Emmanuel
    McEvoy, Robert
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2009, PROCEEDINGS, 2009, 5747 : 81 - 96
  • [9] ISA Extensions of Shuffling Against Side-Channel Attacks
    Zhou, Jiayun
    Qin, Guofeng
    Li, Lu
    Guo, Chun
    Wang, Weijia
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 43 (03) : 761 - 773
  • [10] Survey on performance and security problems of countermeasures for passive side-channel attacks on ECC
    Abarzua, Rodrigo
    Valencia, Claudio
    Lopez, Julio
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (01) : 71 - 102