• DocumentCode
    2253448
  • Title

    Improved countermeasure against Address-bit DPA for ECC scalar multiplication

  • Author

    Izumi, Masami ; Ikegami, Jun ; Sakiyama, Kazuo ; Ohta, Kazuo

  • Author_Institution
    Univ. of Electro-Commun., Tokyo, Japan
  • fYear
    2010
  • fDate
    8-12 March 2010
  • Firstpage
    981
  • Lastpage
    984
  • Abstract
    Messerges, Dabbish and Sloan proposed a DPA attack which analyzes the address values of registers. This attack is called the Address-bit DPA (ADPA) attack. As countermeasures against ADPA, Itoh, Izu and Takenaka proposed algorithms that randomizes address bits. In this paper, we point out that one of their countermeasures has vulnerability even if the address bits are uniformly randomized. When a register is overwritten by the same data as one stored in the register during a data move process, the power consumption is lower than the case of being overwritten by the different data. This fact enables us to separate the power traces. As a result, in the case of the algorithm proposed in, we could invalidate the randomness of the random bits and perform ADPA to retrieve a secret key. Moreover, for the purpose of overcoming the vulnerability, we propose a new countermeasure algorithm.
  • Keywords
    linear algebra; power consumption; public key cryptography; ECC scalar multiplication; address bit DPA attack; data move process; power consumption; register; Energy consumption;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Design, Automation & Test in Europe Conference & Exhibition (DATE), 2010
  • Conference_Location
    Dresden
  • ISSN
    1530-1591
  • Print_ISBN
    978-1-4244-7054-9
  • Type

    conf

  • DOI
    10.1109/DATE.2010.5456907
  • Filename
    5456907