Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems

被引:0
|
作者
Li, Huiyun [1 ]
Chen, Tingding [1 ]
Wu, Keke [1 ]
Yu, Fengqi [1 ]
机构
[1] Chinese Univ Hong Kong, Chinese Acad Sci, Shenzhen Inst Adv Technol, Dept Integrated Elect, Hong Kong, Hong Kong, Peoples R China
关键词
Side-channel; quantitative; security evaluation; Elliptic Curve Cryptosystems;
D O I
10.1109/ICASID.2009.5276923
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Side-channel security has aroused widespread attentions since the first publication of power analysis attack. Enormous research efforts were dedicated to new countermeasures against side-channel attacks. However, there have been very few reports about how to quantitatively verify the effectiveness. This paper presents statistical approaches of quantitative evaluation for Elliptic Curve Cryptosystems. The significance test over the difference of mean measures the distinguishability of the secret key in scalar multiplication. Experiment results demonstrate that the proposed evaluation approaches are accurate and feasible.
引用
收藏
页码:163 / 166
页数:4
相关论文
共 50 条
  • [1] Chosen Message Side-channel Attacks against Elliptic Curve Cryptosystems
    Xiong Liying
    Wang, Yu
    Li, Huiyun
    2011 3RD WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING (ACC 2011), VOL 1, 2011, 1 : 172 - +
  • [2] Quantitative Evaluation of Side-channel Security
    Li, Huiyun
    Chen, Tingding
    Wu, Keke
    Yu, Fengqi
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 456 - 460
  • [3] High Order Side-Channel Security for Elliptic-Curve Implementations
    Belaïd, Sonia
    Rivain, Matthieu
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2023 (01): : 238 - 276
  • [4] Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices
    Chen, Tingding
    Li, Huiyun
    Wu, Keke
    Yu, Fengqi
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 155 - 158
  • [5] Security of elliptic curve cryptosystems
    Uchiyama, Shigenori
    NTT R and D, 1999, 48 (10): : 756 - 761
  • [6] Reactive side-channel countermeasures: Applicability and quantitative security evaluation
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    MICROPROCESSORS AND MICROSYSTEMS, 2018, 62 : 50 - 60
  • [7] The Jacobi model of an elliptic curve and side-channel analysis
    Billet, O
    Joye, M
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2003, 2643 : 34 - 42
  • [8] Power attacks on a side-channel resistant elliptic curve implementation
    Geiselmann, W
    Steinwandt, R
    INFORMATION PROCESSING LETTERS, 2004, 91 (01) : 29 - 32
  • [9] Faster Side-Channel Resistant Elliptic Curve Scalar Multiplication
    Venelli, Alexandre
    Dassance, Francois
    ARITHMETIC, GEOMETRY, CRYPTOGRAPHY AND CODING THEORY 2009, 2010, 521 : 29 - +
  • [10] Study of side-channel attacks for elliptic curve cryptosystem algorithm
    Liu, Shuanggen
    Hu, Yupu
    Xu, Wensheng
    Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/Journal of Wuhan University of Technology (Transportation Science and Engineering), 2007, 31 (03): : 491 - 493