DocumentCode :
1540049
Title :
Power analysis attacks and algorithmic approaches to their countermeasures for Koblitz curve cryptosystems
Author :
Hasan, M.A.
Author_Institution :
Dept. of Electr. & Comput. Eng., Waterloo Univ., Ont., Canada
Volume :
50
Issue :
10
fYear :
2001
fDate :
10/1/2001 12:00:00 AM
Firstpage :
1071
Lastpage :
1083
Abstract :
Because of their shorter key sizes, cryptosystems based on elliptic curves are being increasingly used in practical applications. A special class of elliptic curves, namely, Koblitz curves, offers an additional, but crucial advantage of considerably reduced processing time. Power analysis attacks are applied to cryptosystems that use scalar multiplication on Koblitz curves. Both the simple and the differential power analysis attacks are considered and a number of countermeasures are suggested. While the proposed countermeasures against the simple power analysis attacks rely on making the power consumption for the elliptic curve scalar multiplication independent of the secret key, those for the differential power analysis attacks depend on randomizing the secret key prior to each execution of the scalar multiplication. These countermeasures are computationally efficient and suitable for hardware implementation
Keywords :
cryptography; digital arithmetic; power consumption; power supplies to apparatus; random processes; Koblitz curve cryptosystems; algorithmic approaches; countermeasures; cryptosystems; differential power analysis attacks; elliptic curve scalar multiplication; elliptic curves; hardware implementation; power analysis attacks; power consumption; reduced processing time; scalar multiplication; secret key; Algorithm design and analysis; Elliptic curve cryptography; Elliptic curves; Energy consumption; Hardware; Information analysis; Monitoring; NIST; Signal analysis; Timing;
fLanguage :
English
Journal_Title :
Computers, IEEE Transactions on
Publisher :
ieee
ISSN :
0018-9340
Type :
jour
DOI :
10.1109/12.956092
Filename :
956092
Link To Document :
بازگشت