Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices
•Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown. The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limi...
Gespeichert in:
Veröffentlicht in: | Computers & electrical engineering 2017-10, Vol.63, p.220-231 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | •Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown.
The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers).
[Display omitted] |
---|---|
ISSN: | 0045-7906 1879-0755 |
DOI: | 10.1016/j.compeleceng.2017.05.007 |