Power analysis attacks and algorithmic approaches to their countermeasuresfor Koblitz curve cryptosystems

Authors
Citation
Ma. Hasan, Power analysis attacks and algorithmic approaches to their countermeasuresfor Koblitz curve cryptosystems, IEEE COMPUT, 50(10), 2001, pp. 1071-1083
Citations number
28
Categorie Soggetti
Computer Science & Engineering
Journal title
IEEE TRANSACTIONS ON COMPUTERS
ISSN journal
00189340 → ACNP
Volume
50
Issue
10
Year of publication
2001
Pages
1071 - 1083
Database
ISI
SICI code
0018-9340(200110)50:10<1071:PAAAAA>2.0.ZU;2-#
Abstract
Because of their shorter key sizes, cryptosystems based on elliptic curves are being increasingly used in practical applications. A special class of e lliptic curves, namely, Koblitz curves, offers an additional, but crucial, advantage of considerably reduced processing time. In this article, power a nalysis attacks are applied to cryptosystems that use scalar multiplication on Koblitz curves. Both the simple and the differential power analysis att acks are considered and a number of countermeasures are suggested. While th e proposed countermeasures against the simple power analysis attacks rely o n making the power consumption for the elliptic curve scalar multiplication independent of the secret key, those for the differential power analysis a ttacks depend on randomizing the secret key prior to each execution of the scalar multiplication. These countermeasures are computationally efficient and suitable for hardware implementation.