標題: | An Efficient DPA Countermeasure With Randomized Montgomery Operations for DF-ECC Processor |
作者: | Lee, Jen-Wei Hsiao, Ju-Hung Chang, Hsie-Chia Lee, Chen-Yi 電子工程學系及電子研究所 Department of Electronics Engineering and Institute of Electronics |
關鍵字: | Dual fields;elliptic curve (EC) cryptography (ECC);power-analysis attacks;security system |
公開日期: | 1-May-2012 |
摘要: | Nowadays, differential power-analysis (DPA) attacks are a serious threat for cryptographic systems due to the inherent existence of data-dependent power consumption. Hiding power consumption of encryption circuit or applying key-blinded techniques can increase the security against DPA attacks, but they result in a large overhead for hardware cost, execution time, and energy dissipation. In this brief, a new DPA countermeasure performing all field operations in a randomized Montgomery domain is proposed to eliminate the correlation between target and reference power traces. After implemented in 90-nm CMOS process, our protected 521-bit dual-field elliptic curve (EC) cryptographic processor can perform one EC scalar multiplication in 8.08 ms over GF(p(521)) and 4.65 ms over GF(2(409)), respectively, with 4.3% area and 5.2% power overhead. Experiments from a field-programmable gate array evaluation board demonstrate that the private key of unprotected device will be revealed within 10(3) power traces, whereas the same attacks on our proposal cannot successfully extract the key value even after 10(6) measurements. |
URI: | http://hdl.handle.net/11536/16326 |
ISSN: | 1549-7747 |
期刊: | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS |
Volume: | 59 |
Issue: | 5 |
結束頁: | 287 |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.