Browse > Article
http://dx.doi.org/10.13089/JKIISC.2003.13.3.35

A Random M-ary Method-Based Countermeasure against Power Analysis Attacks on ECC  

안만기 (국방품질관리소)
하재철 (나사렛대학교 정보과학부)
이훈재 (동서대학교 인터넷공학부)
문상재 (경북대학교 전자전기컴퓨터학부)
Abstract
The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side-channel attacks. This paper proposes a countermeasure against simple and differential power analysis attacks through randomizing the transformed m-ary method based on a random m-ary receding algorithm. The proposed method requires an additional computational load compared to the standard m-ary method, yet the power consumption is independent of the secret key. Accordingly, since computational tracks using random window width can resist against SPA and DPA, the proposed countermeasure can improve the security for smart cards.
Keywords
smartcard; side channel attacks; power analysis attacks; SPA/DPA; random m-ary recoding algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Securing elliptic curve point multiplication against side-channel attacks /
[ B.Moller ] / Information Security : 4th International Conference, Proceedings-ISC'01, LNCS 2200
2 DPA countemeasure by improving the window method /
[ K.Itoh;J.Yajima;M.Takenaka;N.Torii ] / Pre-Proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES'02
3 Elliptic curve cryptosystems /
[ N.Koblitz ] / Mathematics of Computation   DOI   ScienceOn
4 Elliptic Curves in Cryptography /
[ I.F.Blake;G.Seroussi;N.P.Smare ] / London Mathematical Society Lecture Note Series
5 Preventing SPA/DPA in ECC systems using the a Jacobi Form /
[ P.Y.Liardet;N.P.Smart ] / Proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES'01, LNCS 2162
6 A method for obtaining digital signatures and public-key cryptosystems /
[ R.L.Rivest;A.Shamir;L.M.Adleman ] / Commnications of the ACM   DOI   ScienceOn
7 Differential Fault Analysis of Secret Key Cryptosystems /
[ E.Biham;A.Shamir ] / Proceedings of Advances in Cryptology-CRYPTO'97, LNCS 1297
8 Power Analysis Attacks on Moular Exponentiation in Smart cards /
[ T.S.Messerges;E.A.Dabbish;R.H.Sloan ] / Proceedings of Workshop on Cryptograhpic Hardware and Embedded Systems-CHES'99,LNCS. LNCS1717
9 More flexible exponentiation with precomputation /
[ C.H.Lim;P.J.Lee ] / CRYPTO'94, LNCS 2200
10 Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other System /
[ P.Kocher ] / Proceedings of Advances in Cryptology- CRYPTO'96, LNCS 1109
11 /
[ Josyula R. Rao;Pankaj Rohatgi ] / EMpowering Side-Channel Attacks
12 A new elliptic curve scalar multiplication algorithm to resistant simple power analysis /
[ Y.Hitchocock;P.Montague ] / Proceedings of Information Security and Privacy-ACISP'02, 7th Australian Conference, LNCS 2384
13 Randomized signed-scalar multip- lication of ECC to resist power attacks /
[ JaeCheol Ha;SangJae Moon ] / Pre-Proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES'02
14 A second-order DPA attack breaks a window-method based countemeasure against side channel attacks /
[ K.Okeya;K.Sakurai ] / Pre-Proceedings of Information Security Conference-ISC'02
15 Differential Power Analysis /
[ P.Kocher;J.Jaffe;B.Jun ] / Proceedings of Advances in Cryptology-CRYPTO'99, LNCS 1666
16 Resistance Against Differential Power Analysis for Elliptic Curve Cryptosystems /
[ J.S.Coron ] / Proceedings of Workshop on Cryptographic Hardware and Embedded Systems-CHES'99, LNCS 1717
17 Power analysis breaks elliptic curve cryptosystems even secure against the timing attack /
[ K.Okeya;K.Sakurai ] / Proceedings of Cryptology-INDOCRYPT'00, LNCS 1977