WU Keke, LI Huiyun, ZHU Dingju, et al., “Efficient Solution to Secure ECC Against Side-channel Attacks,” Chinese Journal of Electronics, vol. 20, no. 3, pp. 471-475, 2011,
Citation: WU Keke, LI Huiyun, ZHU Dingju, et al., “Efficient Solution to Secure ECC Against Side-channel Attacks,” Chinese Journal of Electronics, vol. 20, no. 3, pp. 471-475, 2011,

Efficient Solution to Secure ECC Against Side-channel Attacks

  • Received Date: 2009-10-01
  • Rev Recd Date: 2011-04-01
  • Publish Date: 2011-07-25
  • Elliptic curve cryptosystems (ECC) provide the highest strength per bit of any cryptosystem known today, which makes them especially well suited to computation resource-restricted devices. However, at the ECC implementation stage, a major concern is securing ECC scalar multiplications against Side-channel attacks (SCA). Existing solutions reached the goal by inserting dummy operations, which largely increase the computational costs and prohibit the deployment of ECC in computation resource-restricted devices. In this paper, we propose an efficient and secure scalar multiplication method by partitioning the bit string of the scalar in half and extracting the common substring from the two parts based on propositional logic operations. The computations for common substring are thus saved. Computational results demonstrate the proposed method is approximately 50% more efficient than almost all existing secure solutions. The power measurement experiments prove that the proposed method is secure against SCA.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (841) PDF downloads(956) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return