Low-Complexity Countermeasure Algorithms against Power Attacks for ECC
碩士 === 國立成功大學 === 電機工程學系碩博士班 === 101 === The requirement for security communications are increasing significantly due to the frequently use of electronic business. The elliptic curve cryptography (ECC) gains benefit on key length in contrast to that in Rivest-Shamir-Adleman (RSA) cryptography, the m...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2013
|
Online Access: | http://ndltd.ncl.edu.tw/handle/31492529529803923314 |
id |
ndltd-TW-101NCKU5442142 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-101NCKU54421422015-10-13T22:51:43Z http://ndltd.ncl.edu.tw/handle/31492529529803923314 Low-Complexity Countermeasure Algorithms against Power Attacks for ECC 適用於橢圓曲線密碼系統之低計算複雜度暨抵抗功率攻擊演算法 Szu-HanHuang 黃思翰 碩士 國立成功大學 電機工程學系碩博士班 101 The requirement for security communications are increasing significantly due to the frequently use of electronic business. The elliptic curve cryptography (ECC) gains benefit on key length in contrast to that in Rivest-Shamir-Adleman (RSA) cryptography, the most popular used public key cryptosystem. And the difference between key lengths grows while the security level increases. In recent years, side channel attack becomes a major threat for cryptography. It uses information leaked while the cryptographic device is performing encryption or decryption to crack the system. And power analysis attack is the most common used. We proposed two countermeasures against several kinds of power attack. The first one is random key splitting method while the second countermeasure is random delay method. Those two countermeasures are able to prevent SPA, DPA and ZPA. And the timing overheads for scalar multiplication in both 160-bit GF(p)及GF(2163)are lower thanrelated works. Ming-Der Shieh 謝明得 2013 學位論文 ; thesis 56 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立成功大學 === 電機工程學系碩博士班 === 101 === The requirement for security communications are increasing significantly due to the frequently use of electronic business. The elliptic curve cryptography (ECC) gains benefit on key length in contrast to that in Rivest-Shamir-Adleman (RSA) cryptography, the most popular used public key cryptosystem. And the difference between key lengths grows while the security level increases.
In recent years, side channel attack becomes a major threat for cryptography. It uses information leaked while the cryptographic device is performing encryption or decryption to crack the system. And power analysis attack is the most common used. We proposed two countermeasures against several kinds of power attack. The first one is random key splitting method while the second countermeasure is random delay method. Those two countermeasures are able to prevent SPA, DPA and ZPA. And the timing overheads for scalar multiplication in both 160-bit GF(p)及GF(2163)are lower thanrelated works.
|
author2 |
Ming-Der Shieh |
author_facet |
Ming-Der Shieh Szu-HanHuang 黃思翰 |
author |
Szu-HanHuang 黃思翰 |
spellingShingle |
Szu-HanHuang 黃思翰 Low-Complexity Countermeasure Algorithms against Power Attacks for ECC |
author_sort |
Szu-HanHuang |
title |
Low-Complexity Countermeasure Algorithms against Power Attacks for ECC |
title_short |
Low-Complexity Countermeasure Algorithms against Power Attacks for ECC |
title_full |
Low-Complexity Countermeasure Algorithms against Power Attacks for ECC |
title_fullStr |
Low-Complexity Countermeasure Algorithms against Power Attacks for ECC |
title_full_unstemmed |
Low-Complexity Countermeasure Algorithms against Power Attacks for ECC |
title_sort |
low-complexity countermeasure algorithms against power attacks for ecc |
publishDate |
2013 |
url |
http://ndltd.ncl.edu.tw/handle/31492529529803923314 |
work_keys_str_mv |
AT szuhanhuang lowcomplexitycountermeasurealgorithmsagainstpowerattacksforecc AT huángsīhàn lowcomplexitycountermeasurealgorithmsagainstpowerattacksforecc AT szuhanhuang shìyòngyútuǒyuánqūxiànmìmǎxìtǒngzhīdījìsuànfùzádùjìdǐkànggōnglǜgōngjīyǎnsuànfǎ AT huángsīhàn shìyòngyútuǒyuánqūxiànmìmǎxìtǒngzhīdījìsuànfùzádùjìdǐkànggōnglǜgōngjīyǎnsuànfǎ |
_version_ |
1718080768075366400 |