• DocumentCode
    1768569
  • Title

    An efficient countermeasure against power attacks for ECC over GF(p)

  • Author

    Jheng-Hao Ye ; Szu-Han Huang ; Ming-Der Shieh

  • Author_Institution
    Dept. of Electr. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan
  • fYear
    2014
  • fDate
    1-5 June 2014
  • Firstpage
    814
  • Lastpage
    817
  • Abstract
    Power attacks are serious threats to cryptographic devices, and most countermeasures against power attacks result in a large time overhead for hardware implementation. This work presents an efficient countermeasure against power attacks for elliptic curve cryptography over GF(p). The proposed algorithm adopts the Montgomery ladder scalar multiplication algorithm as a basic framework to protect SPA. Then, a new scheme is presented to effectively manipulate the key so as to reduce the resulting time overhead for preventing differential power attack (DPA) and zero power attack (ZPA). Particularly, the base point blinding technique and half key splitting scheme are used to protect the upper and the lower halves of the key, respectively. Experimental results show the proposed countermeasure exhibit a time advantage over related works. Compared to other countermeasures against SPA, DPA, and ZPA, the proposed one can achieve up to 15% time improvement for accomplishing one 160-bit GF(p) scalar multiplication.
  • Keywords
    matrix multiplication; public key cryptography; DPA; ECC; GF(p); Montgomery ladder scalar multiplication algorithm; ZPA; base point blinding technique; cryptographic devices; differential power attack prevention; elliptic curve cryptography; half key splitting scheme; resulting time overhead reduction; zero power attack prevention; Algorithm design and analysis; Elliptic curve cryptography; Elliptic curves; Hardware; Power demand; Resistance;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Circuits and Systems (ISCAS), 2014 IEEE International Symposium on
  • Conference_Location
    Melbourne VIC
  • Print_ISBN
    978-1-4799-3431-7
  • Type

    conf

  • DOI
    10.1109/ISCAS.2014.6865260
  • Filename
    6865260