Title :
Algorithm-Based Countermeasures against Power Analysis Attacks for Public-Key Cryptography SM2
Author :
Xiaowei Han ; Beibei Wang ; An Wang ; Liji Wu ; Woogeun Rhee
Author_Institution :
Tsinghua Nat. Lab. for Inf. Sci. & Technol. Inst. of Microelectron., Tsinghua Univ., Beijing, China
Abstract :
SM2 is a public-key cryptography algorithm which is based on elliptic curves. Since the side channel leakage of devices can be used to deduce the information of secret keys, algorithms to implement SM2 need to be improved. In this paper, we propose an initialized masking scalar multiplication algorithm (IMSM), a modified atomic point doubling and point addition algorithm (MADA), and a transformed formula countermeasure (TFCS). Analysis shows they can resist Simple Power Analysis (SPA), Differential Power Analysis and Template Attacks. IMSM and MADA have been verified to resist SPA on FPGA board successfully. Compared to Binary Expansion with RIP algorithm, 28.6% calculations can be saved when the scalar is divided into four parts, which is rather fast.
Keywords :
digital arithmetic; field programmable gate arrays; public key cryptography; FPGA board; IMSM; MADA; RIP algorithm; SPA; TFCS; algorithm-based countermeasures; binary expansion; differential power analysis; elliptic curves; initialized masking scalar multiplication algorithm; modified atomic point doubling and point addition algorithm; power analysis attacks; public-key cryptography SM2; side channel leakage; simple power analysis; template attacks; transformed formula countermeasure; Algorithm design and analysis; Elliptic curve cryptography; Elliptic curves; Jacobian matrices; Resists; Transforms; IMSM; MADA; SM2; TFCS; elliptic curve cryptography;
Conference_Titel :
Computational Intelligence and Security (CIS), 2014 Tenth International Conference on
Conference_Location :
Kunming
Print_ISBN :
978-1-4799-7433-7
DOI :
10.1109/CIS.2014.116