• DocumentCode
    511785
  • Title

    A robust algorithm for DPA-resistant ECC

  • Author

    Wang, Yi ; Douglas, L.M.

  • Author_Institution
    UCL crypto group, Louvain-la-Neuve, Belgium
  • fYear
    2009
  • fDate
    14-16 Dec. 2009
  • Firstpage
    667
  • Lastpage
    670
  • Abstract
    A power analysis attack is an efficient way to break general ECC encryption implementations in hardware. The simple power attack (SPA) and the differential power attack (DPA) were initial mechanisms power analysis attacks. More advanced power attack techniques applicable to elliptic curve cryptosystems, such as refined power analysis (RPA) and zero power analysis (ZPA), were introduced. These techniques use the special features of the elliptic curve where the power consumption is zero to attack the implementation. In this paper, we also present a differential power analysis (DPA) attack using an initial value, called an ¿initial value DPA¿ attack, which can compromise Kim´s countermeasure against power analysis attacks. We then propose a novel countermeasure which provides a better defense against both SPA and DPA attacks.
  • Keywords
    public key cryptography; DPA-resistant ECC; advanced power attack techniques; differential power attack; elliptic curve cryptosystems; power analysis attack; refined power analysis; zero power analysis; Algorithm design and analysis; Elliptic curve cryptography; Elliptic curves; Energy consumption; Power engineering and energy; Power engineering computing; Public key cryptography; Registers; Robustness; Variable speed drives; DPA; ECC; countermeasure; power attack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Integrated Circuits, ISIC '09. Proceedings of the 2009 12th International Symposium on
  • Conference_Location
    Singapore
  • Print_ISBN
    978-9-8108-2468-6
  • Type

    conf

  • Filename
    5403788