Published in

2016 International Conference on Design and Technology of Integrated Systems in Nanoscale Era (DTIS)

DOI: 10.1109/dtis.2016.7483807

Links

Tools

Export citation

Search in Google Scholar

Residue Number System as a Side Channel and Fault Injection Attack countermeasure in Elliptic Curve Cryptography

Proceedings article published in 2016 by Apostolos P. Fournaris, Louiza Papachristodoulou, Lejla Batina, Nicolas Sklavos
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Implementation attacks and more specifically Power Analysis (PA) (the dominant type of side channel attack) and fault injection (FA) attacks constitute a pragmatic hazard for scalar multiplication, the main operation behind Elliptic Curve Cryptography. There exists a wide variety of countermeasures attempting to thwart such attacks that, however, few of them explore the potential of alternative number systems like the Residue Number System (RNS). In this paper, we explore the potential of RNS as an PA-FA countermeasure and propose an PA-FA resistant scalar multiplication algorithm and provide an extensive security analysis against the most effective PA-FA techniques. We argue through a security analysis that combining traditional PA-FA countermeasures with lightweight RNS countermeasures can provide strong PA-FA resistance.