Abstract
We propose three differential power analysis (DPA) countermeasures for securing the public key cryptosystems. All countermeasures are based on the window method, and can be used in both RSA and elliptic curve cryptosystems (ECC). By using the optimal countermeasure, performance penalty is small. In comparison with k-ary method, computation time of our countermeasure is only 105% in 1024-bit RSA and 119% in 160-bit ECC.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Christophe Clavier and Marc Joye, “Universal Exponentiation Algorithm-A First Step Towards Provable SPA Resistance”, CHES 2001, LNCS 2162, pp. 300–308, Springer-Verlag, 2001.
Jean-Sébastien Coron, “Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems”, CHES’99, LNCS 1717, pp. 292–302, Springer-Verlag, 99.
Marc Joye and Christophe Tymen, “Protections against Differential Analysis for Elliptic Curve Cryptography”, CHES 2001, LNCS 2162, pp. 377–390, Springer-Verlag, 2001.
Paul Kocher, Joshua Jaffe, and Benjamin Jun, “Differential Power Analysis”, Advances in Cryptography-CRYPTO’99, pp. 388–397.
P.-Y. Liardet and N.P. Smart, “Preventing SPA/DPA in ECC Systems Using the Jacobi Form”, Cryptographic Hardware and Embedded Systems, CHES 2001, pp. 391–401.
Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan, “Investigations of Power Analysis Attacks on Smartcards, ”, Proceedings of USENIX Workshop on Smartcard Technology, May 1999, pp. 151–161.
Thomas S. Messerges, Ezzy A. Dabbish and Robert H. Sloan, “Power Analysis Attacks of Modular Exponentiation in Smartcards.”, Cryptographic Hardware and Embedded Systems, CHES’99, LNCS 1717, pp. 144–157.
Bodo Moller, “Securing Elliptic Curve Point Multiplication against Side-Channel Attacks”, Information Security-ISC 2001, pp. 324–334.
K. Okeya, K. Miyazaki and K. Sakurai, “A fast scalar multiplication method with randomized coordinates on a Montgomery-form elliptic curve secure against side channel attacks”, ICISC 2001, LNCS 2288, pp. 428–439, Springer-Verlag, 2001.
Elisabeth Oswald and Manfred Aigner, “Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks”, Cryptographic Hardware and Embedded Systems, CHES 2001, pp. 39–50.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Itoh, K., Yajima, J., Takenaka, M., Torii, N. (2003). DPA Countermeasures by Improving the Window Method. In: Kaliski, B.S., Koç, ç.K., Paar, C. (eds) Cryptographic Hardware and Embedded Systems - CHES 2002. CHES 2002. Lecture Notes in Computer Science, vol 2523. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36400-5_23
Download citation
DOI: https://doi.org/10.1007/3-540-36400-5_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00409-7
Online ISBN: 978-3-540-36400-9
eBook Packages: Springer Book Archive