Quantitative Evaluation of Side-channel Security for Elliptic Curve Cryptosystems

被引:0
|
作者
Li, Huiyun [1 ]
Chen, Tingding [1 ]
Wu, Keke [1 ]
Yu, Fengqi [1 ]
机构
[1] Chinese Univ Hong Kong, Chinese Acad Sci, Shenzhen Inst Adv Technol, Dept Integrated Elect, Hong Kong, Hong Kong, Peoples R China
关键词
Side-channel; quantitative; security evaluation; Elliptic Curve Cryptosystems;
D O I
10.1109/ICASID.2009.5276923
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Side-channel security has aroused widespread attentions since the first publication of power analysis attack. Enormous research efforts were dedicated to new countermeasures against side-channel attacks. However, there have been very few reports about how to quantitatively verify the effectiveness. This paper presents statistical approaches of quantitative evaluation for Elliptic Curve Cryptosystems. The significance test over the difference of mean measures the distinguishability of the secret key in scalar multiplication. Experiment results demonstrate that the proposed evaluation approaches are accurate and feasible.
引用
收藏
页码:163 / 166
页数:4
相关论文
共 50 条
  • [21] Efficient and side-channel-aware implementations of elliptic curve cryptosystems over prime fields
    Karakoyunlu, D.
    Gurkaynak, F. K.
    Sunar, B.
    Leblebici, Y.
    IET INFORMATION SECURITY, 2010, 4 (01) : 30 - 43
  • [22] Performance Evaluation of Elliptic Curve Projective Coordinates with Parallel GF(p) Field Operations and Side-Channel Atomicity
    Al-Somani, Turki F.
    JOURNAL OF COMPUTERS, 2010, 5 (01) : 99 - 109
  • [23] Progress of and some comments on the research of side-channel attack for cryptosystems
    Gu, Dawu
    Zhang, Chi
    Lu, Xiangjun
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (01): : 14 - 21
  • [24] ELLIPTIC CURVE CRYPTOSYSTEMS
    KOBLITZ, N
    MATHEMATICS OF COMPUTATION, 1987, 48 (177) : 203 - 209
  • [25] Parallelizable elliptic curve point multiplication method with resistance against side-channel attacks
    Möller, B
    INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 402 - 413
  • [26] Multi-class SVMs Analysis of Side-Channel Information of Elliptic Curve Cryptosystem
    Saeedi, Ehsan
    Hossain, Md. Selim
    Kong, Yinan
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS (SPECTS), 2015,
  • [27] Side-channel security of superscalar CPUs
    Barenghi, Alessandro
    Pelosi, Gerardo
    2018 55TH ACM/ESDA/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2018,
  • [28] Side-channel attacks on the McEliece and Niederreiter public-key cryptosystems
    Avanzi, Roberto
    Hoerder, Simon
    Page, Dan
    Tunstall, Michael
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (01) : 75 - 75
  • [29] Design for EM Side-Channel Security through Quantitative Assessment of RTL Implementations
    He, Jiaji
    Ma, Haocheng
    Guo, Xialong
    Zhao, Yiqiang
    Jin, Yier
    2020 25TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2020, 2020, : 62 - 67
  • [30] Side-Channel Analysis for Searchable Encryption System and its Security Evaluation
    Yoshikawa, Masaya
    Ikezaki, Yoshiya
    Nozaki, Yusuke
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 465 - 469