Visible to the public Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography

TitleResidue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography
Publication TypeConference Paper
Year of Publication2016
AuthorsFournaris, A. P., Papachristodoulou, L., Batina, L., Sklavos, N.
Conference Name2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS)
KeywordsAlgorithm design and analysis, composability, Electronic mail, Elliptic curve cryptography, Elliptic curve cryptography (ECC), fault detection, fault injection attack, Manganese, Metrics, PA-FA countermeasure, power analysis, pragmatic hazard, pubcrawl, public key cryptography, residue number system, residue number systems, Resiliency, Resistance, RNS, scalar multiplication, security analysis, side channel attack
Abstract

Implementation attacks and more specifically Power Analysis (PA) (the dominant type of side channel attack) and fault injection (FA) attacks constitute a pragmatic hazard for scalar multiplication, the main operation behind Elliptic Curve Cryptography. There exists a wide variety of countermeasures attempting to thwart such attacks that, however, few of them explore the potential of alternative number systems like the Residue Number System (RNS). In this paper, we explore the potential of RNS as an PA-FA countermeasure and propose an PA-FA resistant scalar multiplication algorithm and provide an extensive security analysis against the most effective PA-FA techniques. We argue through a security analysis that combining traditional PA-FA countermeasures with lightweight RNS countermeasures can provide strong PA-FA resistance.

URLhttps://ieeexplore.ieee.org/document/7483807/keywords#keywords
DOI10.1109/DTIS.2016.7483807
Citation Keyfournaris_residue_2016