DocumentCode
511785
Title
A robust algorithm for DPA-resistant ECC
Author
Wang, Yi ; Douglas, L.M.
Author_Institution
UCL crypto group, Louvain-la-Neuve, Belgium
fYear
2009
fDate
14-16 Dec. 2009
Firstpage
667
Lastpage
670
Abstract
A power analysis attack is an efficient way to break general ECC encryption implementations in hardware. The simple power attack (SPA) and the differential power attack (DPA) were initial mechanisms power analysis attacks. More advanced power attack techniques applicable to elliptic curve cryptosystems, such as refined power analysis (RPA) and zero power analysis (ZPA), were introduced. These techniques use the special features of the elliptic curve where the power consumption is zero to attack the implementation. In this paper, we also present a differential power analysis (DPA) attack using an initial value, called an ¿initial value DPA¿ attack, which can compromise Kim´s countermeasure against power analysis attacks. We then propose a novel countermeasure which provides a better defense against both SPA and DPA attacks.
Keywords
public key cryptography; DPA-resistant ECC; advanced power attack techniques; differential power attack; elliptic curve cryptosystems; power analysis attack; refined power analysis; zero power analysis; Algorithm design and analysis; Elliptic curve cryptography; Elliptic curves; Energy consumption; Power engineering and energy; Power engineering computing; Public key cryptography; Registers; Robustness; Variable speed drives; DPA; ECC; countermeasure; power attack;
fLanguage
English
Publisher
ieee
Conference_Titel
Integrated Circuits, ISIC '09. Proceedings of the 2009 12th International Symposium on
Conference_Location
Singapore
Print_ISBN
978-9-8108-2468-6
Type
conf
Filename
5403788
Link To Document