Procedures for Securing ECC Implementations Against Differential Power Analysis Using Reconfigurable Architectures

作者: Marc Stöttinger , Felix Madlener , Sorin A. Huss

DOI: 10.1007/978-90-481-3485-4_19

关键词:

摘要: Side channel attacks have changed the design of secure cryptosystems dramatically. Today a reasonable designed cryptosystem has not only to be cryptographically secure, but resistant against side as well. Therefore many countermeasure techniques been developed in last years avoid exploitable information leaking. We introduce new concepts approaches differential power analysis an essential operation elliptic curve cryptography \(\mathbb {GF}(2^{n})\) . Similar other published countermeasures we are focusing on architecture layer cryptographic operations. This type is geared well-known hiding methods this research field, apply them different implementation layer. For securing multiplication over , cryptography, propose countermeasure, which highly scalable and thus allows select arbitrary trade-offs between performance resistance.

参考文章(19)
Johannes Blömer, Jorge Guajardo, Volker Krummel, Provably Secure Masking of AES Selected Areas in Cryptography. pp. 69- 83 ,(2004) , 10.1007/978-3-540-30564-4_5
Christophe Clavier, Marc Joye, Universal Exponentiation Algorithm A First Step towards Provable SPA-Resistance cryptographic hardware and embedded systems. pp. 300- 308 ,(2001) , 10.1007/3-540-44709-1_25
Stefan Mangard, Elisabeth Oswald, Thomas Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security) Springer-Verlag New York, Inc.. ,(2007)
Marc Joye, Christophe Tymen, Protections against Differential Analysis for Elliptic Curve Cryptography — An Algebraic Approach — cryptographic hardware and embedded systems. pp. 377- 390 ,(2001) , 10.1007/3-540-44709-1_31
Jean-Sébastien Coron, Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems cryptographic hardware and embedded systems. pp. 292- 302 ,(1999) , 10.1007/3-540-48059-5_25
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto, Efficient Countermeasures against RPA, DPA, and SPA Lecture Notes in Computer Science. ,vol. 3156, pp. 343- 356 ,(2004) , 10.1007/978-3-540-28632-5_25
Stefan Mangard, Elisabeth Oswald, Thomas Popp, Power Analysis Attacks: Revealing the Secrets of Smart Cards ,(2007)
Julio López, Ricardo Dahab, Improved Algorithms for Elliptic Curve Arithmetic in GF(2n) selected areas in cryptography. pp. 201- 212 ,(1998) , 10.1007/3-540-48892-8_16
A. Karatsuba, Yu. Ofman, Multiplication of Multidigit Numbers on Automata Soviet physics. Doklady. ,vol. 7, pp. 595- 596 ,(1963)
Mathieu Ciet, Marc Joye, Virtually) Free Randomization Techniques for Elliptic Curve Cryptography international conference on information and communication security. ,vol. 2836, pp. 348- 359 ,(2003) , 10.1007/978-3-540-39927-8_32