Low-Complexity Countermeasure Algorithms against Power Attacks for ECC

碩士 === 國立成功大學 === 電機工程學系碩博士班 === 101 === The requirement for security communications are increasing significantly due to the frequently use of electronic business. The elliptic curve cryptography (ECC) gains benefit on key length in contrast to that in Rivest-Shamir-Adleman (RSA) cryptography, the m...

Full description

Bibliographic Details
Main Authors: Szu-HanHuang, 黃思翰
Other Authors: Ming-Der Shieh
Format: Others
Language:en_US
Published: 2013
Online Access:http://ndltd.ncl.edu.tw/handle/31492529529803923314
id ndltd-TW-101NCKU5442142
record_format oai_dc
spelling ndltd-TW-101NCKU54421422015-10-13T22:51:43Z http://ndltd.ncl.edu.tw/handle/31492529529803923314 Low-Complexity Countermeasure Algorithms against Power Attacks for ECC 適用於橢圓曲線密碼系統之低計算複雜度暨抵抗功率攻擊演算法 Szu-HanHuang 黃思翰 碩士 國立成功大學 電機工程學系碩博士班 101 The requirement for security communications are increasing significantly due to the frequently use of electronic business. The elliptic curve cryptography (ECC) gains benefit on key length in contrast to that in Rivest-Shamir-Adleman (RSA) cryptography, the most popular used public key cryptosystem. And the difference between key lengths grows while the security level increases. In recent years, side channel attack becomes a major threat for cryptography. It uses information leaked while the cryptographic device is performing encryption or decryption to crack the system. And power analysis attack is the most common used. We proposed two countermeasures against several kinds of power attack. The first one is random key splitting method while the second countermeasure is random delay method. Those two countermeasures are able to prevent SPA, DPA and ZPA. And the timing overheads for scalar multiplication in both 160-bit GF(p)及GF(2163)are lower thanrelated works. Ming-Der Shieh 謝明得 2013 學位論文 ; thesis 56 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 碩士 === 國立成功大學 === 電機工程學系碩博士班 === 101 === The requirement for security communications are increasing significantly due to the frequently use of electronic business. The elliptic curve cryptography (ECC) gains benefit on key length in contrast to that in Rivest-Shamir-Adleman (RSA) cryptography, the most popular used public key cryptosystem. And the difference between key lengths grows while the security level increases. In recent years, side channel attack becomes a major threat for cryptography. It uses information leaked while the cryptographic device is performing encryption or decryption to crack the system. And power analysis attack is the most common used. We proposed two countermeasures against several kinds of power attack. The first one is random key splitting method while the second countermeasure is random delay method. Those two countermeasures are able to prevent SPA, DPA and ZPA. And the timing overheads for scalar multiplication in both 160-bit GF(p)及GF(2163)are lower thanrelated works.
author2 Ming-Der Shieh
author_facet Ming-Der Shieh
Szu-HanHuang
黃思翰
author Szu-HanHuang
黃思翰
spellingShingle Szu-HanHuang
黃思翰
Low-Complexity Countermeasure Algorithms against Power Attacks for ECC
author_sort Szu-HanHuang
title Low-Complexity Countermeasure Algorithms against Power Attacks for ECC
title_short Low-Complexity Countermeasure Algorithms against Power Attacks for ECC
title_full Low-Complexity Countermeasure Algorithms against Power Attacks for ECC
title_fullStr Low-Complexity Countermeasure Algorithms against Power Attacks for ECC
title_full_unstemmed Low-Complexity Countermeasure Algorithms against Power Attacks for ECC
title_sort low-complexity countermeasure algorithms against power attacks for ecc
publishDate 2013
url http://ndltd.ncl.edu.tw/handle/31492529529803923314
work_keys_str_mv AT szuhanhuang lowcomplexitycountermeasurealgorithmsagainstpowerattacksforecc
AT huángsīhàn lowcomplexitycountermeasurealgorithmsagainstpowerattacksforecc
AT szuhanhuang shìyòngyútuǒyuánqūxiànmìmǎxìtǒngzhīdījìsuànfùzádùjìdǐkànggōnglǜgōngjīyǎnsuànfǎ
AT huángsīhàn shìyòngyútuǒyuánqūxiànmìmǎxìtǒngzhīdījìsuànfùzádùjìdǐkànggōnglǜgōngjīyǎnsuànfǎ
_version_ 1718080768075366400