期刊文献+

一种抗简单功耗分析攻击的椭圆曲线标量乘快速实现算法 被引量:2

A Fast Algorithm of Scalar Multiplication on ECC Resistant Against SPA
下载PDF
导出
摘要 针对添加伪点加法在抵抗简单功耗分析攻击的同时效率损失过大的问题,为更好兼顾效率与安全,提出一种新的标量乘快速实现算法——随机伪操作法,通过以单片机为核心运算控制芯片的功耗分析平台进行实测分析验证,随机伪操作法不但能够很好抵抗简单功耗分析攻击,而且相对于添加伪点加法运算效率提高30%-50%。 The pseudo-point additions method acquires resisting Simple Power Analysis Attacking(SPA) capability at cost of greatly power losing.The novel Random-Pseudo Operation algorithm of fast scalar multiplication method was proposed to improve its security with better efficiency.A power analyzing platform with the MCU being as kernel control chip was designed for validation purpose.Results show the novel algorithm not only could be well resisting against SPA attacks, but also increase efficiency by about 30-50 percents compared to conventional pseudo-point addition method.
出处 《成都信息工程学院学报》 2011年第1期5-10,共6页 Journal of Chengdu University of Information Technology
基金 国家自然科学基金资助项目(60873216) 电子信息产业发展基金资助项目(财建[2006])824号 信部运[2006]717号) 成都市"十一五"重大科技专项项目(09GGZD988GX-033)
关键词 信息安全 边信道攻防 简单功耗分析攻击 标量乘 随机伪操作 单片机 information security side-channel attack and defense SPA scalar multiplication random pseudo operation MCU
  • 相关文献

参考文献6

二级参考文献37

共引文献36

同被引文献16

  • 1石润华,钟诚.一种快速的椭圆曲线标量乘方法[J].计算机工程与应用,2006,42(2):156-158. 被引量:9
  • 2TETSUYA I, BODO M, TSUYOSH T. Improved elliptic curve multiplication methods resistant against side channel attacks[A]. Progress in Cryptology, LNCS 2551[C]. Springer-Verlag, 2002. 295-3 l 3.
  • 3MILLER V S. Use of elliptic curves in cryptography[A]. Proceedings of Crypto 85 LNCS 218[C]. Springer, 1986. 417-426.
  • 4KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Com- putation, 1987,(48):203- 209.
  • 5ACICMEZ O, SEIFERT J P, KOC C K. Predicting secret keys via branch prediction[A]. Topics in Cryptology-CT-RSA 2007, Leture Notes in Computer Science[C]. 2006.225-242.
  • 6ACIICMEZ O, KOC C K, SEIFERT J P. On the Power of Simple Branch Prediction Analysis[R]. Cryptology ePrint Archive, 2006. 312-320.
  • 7KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Lecture Notes in Computer Science; Proceedings of the 19th Annual Interna- tional Cryptology. Conference on Advances in Cryptology[C]. 1999. 388- 397.
  • 8KOCHER P C. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems[A]. Advances in Cryptology- CRYPTO'96, of Lecture Notes in Computer Science[C]. 1996. 104-113.
  • 9赖晖.椭圆曲线密码体制中的快速点乘算法[J].微计算机信息,2007,23(03X):228-229. 被引量:6
  • 10Kocher P, Jaffe J, Jun B. Introcuction to differential power analysis and related attacks[EB/OL], http:// www. Cryptography. com/dpa/technical, 1998.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部