{"title":"椭圆曲线密码装置侧信道对抗的评价准则","authors":"Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu","doi":"10.1109/ICCCS.2009.13","DOIUrl":null,"url":null,"abstract":"The Elliptic Curve Cryptography (ECC) is widely deployed into embedded cryptographic devices. However, straightforward implementations of ECC are prone to side-channel analysis attacks. A number of countermeasures against side-channel analysis attacks exist with different effectiveness and efficiency. How to evaluate these countermeasures with a unified and quantitative criterion becomes a challenging task. This paper presents an evaluation criterion using the ratio between the security factor and the computational cost, to assess the efficiency and effectiveness of side-channel countermeasures. The security factor statistically measures the similarity between operations processing bit ‘0’ and those processing bit ‘1’. The computation cost measures the number of atomic operations in the scalar multiplication. Experiment results on smart cards with three different countermeasures demonstrate the feasibility of the proposed evaluation criterion.","PeriodicalId":103274,"journal":{"name":"2009 International Conference on Computer and Communications Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices\",\"authors\":\"Tingding Chen, Huiyun Li, Keke Wu, Fengqi Yu\",\"doi\":\"10.1109/ICCCS.2009.13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Elliptic Curve Cryptography (ECC) is widely deployed into embedded cryptographic devices. However, straightforward implementations of ECC are prone to side-channel analysis attacks. A number of countermeasures against side-channel analysis attacks exist with different effectiveness and efficiency. How to evaluate these countermeasures with a unified and quantitative criterion becomes a challenging task. This paper presents an evaluation criterion using the ratio between the security factor and the computational cost, to assess the efficiency and effectiveness of side-channel countermeasures. The security factor statistically measures the similarity between operations processing bit ‘0’ and those processing bit ‘1’. The computation cost measures the number of atomic operations in the scalar multiplication. Experiment results on smart cards with three different countermeasures demonstrate the feasibility of the proposed evaluation criterion.\",\"PeriodicalId\":103274,\"journal\":{\"name\":\"2009 International Conference on Computer and Communications Security\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Computer and Communications Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCS.2009.13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computer and Communications Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCS.2009.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Evaluation Criterion of Side-Channel Countermeasures for Elliptic Curve Cryptography Devices
The Elliptic Curve Cryptography (ECC) is widely deployed into embedded cryptographic devices. However, straightforward implementations of ECC are prone to side-channel analysis attacks. A number of countermeasures against side-channel analysis attacks exist with different effectiveness and efficiency. How to evaluate these countermeasures with a unified and quantitative criterion becomes a challenging task. This paper presents an evaluation criterion using the ratio between the security factor and the computational cost, to assess the efficiency and effectiveness of side-channel countermeasures. The security factor statistically measures the similarity between operations processing bit ‘0’ and those processing bit ‘1’. The computation cost measures the number of atomic operations in the scalar multiplication. Experiment results on smart cards with three different countermeasures demonstrate the feasibility of the proposed evaluation criterion.