Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography
Title | Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Fournaris, A. P., Papachristodoulou, L., Batina, L., Sklavos, N. |
Conference Name | 2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS) |
Keywords | Algorithm design and analysis, composability, Electronic mail, Elliptic curve cryptography, Elliptic curve cryptography (ECC), fault detection, fault injection attack, Manganese, Metrics, PA-FA countermeasure, power analysis, pragmatic hazard, pubcrawl, public key cryptography, residue number system, residue number systems, Resiliency, Resistance, RNS, scalar multiplication, security analysis, side channel attack |
Abstract | Implementation attacks and more specifically Power Analysis (PA) (the dominant type of side channel attack) and fault injection (FA) attacks constitute a pragmatic hazard for scalar multiplication, the main operation behind Elliptic Curve Cryptography. There exists a wide variety of countermeasures attempting to thwart such attacks that, however, few of them explore the potential of alternative number systems like the Residue Number System (RNS). In this paper, we explore the potential of RNS as an PA-FA countermeasure and propose an PA-FA resistant scalar multiplication algorithm and provide an extensive security analysis against the most effective PA-FA techniques. We argue through a security analysis that combining traditional PA-FA countermeasures with lightweight RNS countermeasures can provide strong PA-FA resistance. |
URL | https://ieeexplore.ieee.org/document/7483807/keywords#keywords |
DOI | 10.1109/DTIS.2016.7483807 |
Citation Key | fournaris_residue_2016 |
- pragmatic hazard
- side channel attack
- Security analysis
- scalar multiplication
- RNS
- Resistance
- Resiliency
- residue number systems
- residue number system
- public key cryptography
- pubcrawl
- Algorithm design and analysis
- power analysis
- PA-FA countermeasure
- Metrics
- Manganese
- fault injection attack
- fault detection
- Elliptic curve cryptography (ECC)
- Elliptic curve cryptography
- Electronic mail
- composability