DocumentCode
2253448
Title
Improved countermeasure against Address-bit DPA for ECC scalar multiplication
Author
Izumi, Masami ; Ikegami, Jun ; Sakiyama, Kazuo ; Ohta, Kazuo
Author_Institution
Univ. of Electro-Commun., Tokyo, Japan
fYear
2010
fDate
8-12 March 2010
Firstpage
981
Lastpage
984
Abstract
Messerges, Dabbish and Sloan proposed a DPA attack which analyzes the address values of registers. This attack is called the Address-bit DPA (ADPA) attack. As countermeasures against ADPA, Itoh, Izu and Takenaka proposed algorithms that randomizes address bits. In this paper, we point out that one of their countermeasures has vulnerability even if the address bits are uniformly randomized. When a register is overwritten by the same data as one stored in the register during a data move process, the power consumption is lower than the case of being overwritten by the different data. This fact enables us to separate the power traces. As a result, in the case of the algorithm proposed in, we could invalidate the randomness of the random bits and perform ADPA to retrieve a secret key. Moreover, for the purpose of overcoming the vulnerability, we propose a new countermeasure algorithm.
Keywords
linear algebra; power consumption; public key cryptography; ECC scalar multiplication; address bit DPA attack; data move process; power consumption; register; Energy consumption;
fLanguage
English
Publisher
ieee
Conference_Titel
Design, Automation & Test in Europe Conference & Exhibition (DATE), 2010
Conference_Location
Dresden
ISSN
1530-1591
Print_ISBN
978-1-4244-7054-9
Type
conf
DOI
10.1109/DATE.2010.5456907
Filename
5456907
Link To Document