Title :
Method for designing multi-channel RNS architectures to prevent power analysis SCA
Author :
Pettenghi, H. ; Ambrose, Jude Angelo ; Chaves, Rafael ; Sousa, Leonel
Author_Institution :
INESC-ID, Univ. de Lisboa, Lisbon, Portugal
Abstract :
Power analysis attacks are one of the most common Side-Channel Attacks (SCAs), proven to be extremely successful even on protected embedded devices. This paper proposes the use of a Residue Number System (RNS) architecture with randomly permuted moduli sets to implement the Double-and-Add computation, which is proven as the most susceptible operation in Elliptic Curve Cryptography (ECC). The proposed solution randomly permutes the moduli sets, allowing randomized power traces, significantly removing the correlation between the power dissipation and the secret key and eliminating the need for the intermediate conversion to binary required in the state-of-the-art. Architectures obtained for a 90nm standard cell technology suggest that a significant power analysis resistance is achieved for the Double-and-Add circuitry, incurring an extra performance cost of 3 times compared to the related state-of-the-art.
Keywords :
correlation theory; cryptography; private key cryptography; public key cryptography; residue number systems; ECC; correlation removal; double-and-add circuitry computation; elliptic curve cryptography; intermediate conversion; multichannel RNS architecture design method; power analysis SCA prevention; power analysis resistance; power dissipation; protected embedded device; randomized power traces; randomly permuted moduli set; residue number system; secret key; side-channel attack; size 90 nm; standard cell technology; Adders; Computer architecture; Control systems; Correlation; Power dissipation; Resistance; Standards;
Conference_Titel :
Circuits and Systems (ISCAS), 2014 IEEE International Symposium on
Conference_Location :
Melbourne VIC
Print_ISBN :
978-1-4799-3431-7
DOI :
10.1109/ISCAS.2014.6865614