Implementation and Comparison of SPA and DPA Countermeasures for Elliptic Curve Point Multiplication
Title | Implementation and Comparison of SPA and DPA Countermeasures for Elliptic Curve Point Multiplication |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Ostrowski, Łukasz, Marcinek, Krzysztof, Pleskacz, Witold A. |
Conference Name | 2019 MIXDES - 26th International Conference "Mixed Design of Integrated Circuits and Systems" |
Keywords | Differential Power Analysis Attack, differential power analysis attacks, DPA countermeasures, Elliptic curve cryptography, Elliptic Curve Cryptosystem, elliptic curve cryptosystems, elliptic curve point multiplication, hardware description languages, integrated circuits, Logic gates, Metrics, power analysis attacks, pubcrawl, public key cryptography, resilience, Resiliency, Scalability, side channel analysis attacks, Simple Power Analysis Attack |
Abstract | The core operation of all cryptosystems based on Elliptic Curve Cryptography is Elliptic Curve Point Multiplication. Depending on implementation it can be vulnerable to different Side Channel Analysis attacks exploiting information leakage, such as power consumption or execution time. Multiple countermeasures against these attacks have been developed over time, each having different impact on parameters of the cryptosystem. This paper summarizes popular countermeasures for simple and differential power analysis attacks on Elliptic Curve cryptosystems. Presented secure algorithms were implemented in Verilog hardware description language and synthesized to logic gates for power trace generation. |
DOI | 10.23919/MIXDES.2019.8787129 |
Citation Key | ostrowski_implementation_2019 |
- Logic gates
- Simple Power Analysis Attack
- side channel analysis attacks
- Scalability
- Resiliency
- resilience
- public key cryptography
- pubcrawl
- power analysis attacks
- Metrics
- Differential Power Analysis Attack
- integrated circuits
- hardware description languages
- elliptic curve point multiplication
- elliptic curve cryptosystems
- Elliptic Curve Cryptosystem
- Elliptic curve cryptography
- DPA countermeasures
- differential power analysis attacks