Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices

•Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown. The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & electrical engineering 2017-10, Vol.63, p.220-231
Hauptverfasser: Wang, An, Wang, Ce, Zheng, Xuexin, Tian, Weina, Xu, Rixin, Zhang, Guoshuang
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 231
container_issue
container_start_page 220
container_title Computers & electrical engineering
container_volume 63
creator Wang, An
Wang, Ce
Zheng, Xuexin
Tian, Weina
Xu, Rixin
Zhang, Guoshuang
description •Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown. The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers). [Display omitted]
doi_str_mv 10.1016/j.compeleceng.2017.05.007
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1976002595</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0045790617312740</els_id><sourcerecordid>1976002595</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-ddc8687b251bf341b6131cfcb1a1d128fff10778a9de0dab3b6444f3c11a3ebe3</originalsourceid><addsrcrecordid>eNqNkM1LAzEQxYMoWKv_Q8TzrjPdj-x6k-IXiIK255BNJpra3dQkFfrfu1IPHj0NA--9mfdj7BwhR8D6cpVr329oTZqGt3wGKHKocgBxwCbYiDYDUVWHbAJQVplooT5mJzGuYNxrbCase1GD8T3_oB0PPqnk_HDFX52hTL-rYaA11347JAo9qbgNxL3lT4uXJddht0k-7mKinlsfeKDot0FTtna9S2S4oS-nKZ6yI6vWkc5-55Qtb28W8_vs8fnuYX79mOmibFNmjG7qRnSzCjtblNjVWKC2ukOFBmeNtRZBiEa1hsCorujqsixtoRFVQR0VU3axz90E_7mlmORq_GcYT0psRQ0wq9pqVLV7lQ4-xkBWboLrVdhJBPmDVK7kH6TyB6mESo5IR-9876WxxpejIKN2NGgyLpBO0nj3j5RvUF6H2A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1976002595</pqid></control><display><type>article</type><title>Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices</title><source>ScienceDirect Journals (5 years ago - present)</source><creator>Wang, An ; Wang, Ce ; Zheng, Xuexin ; Tian, Weina ; Xu, Rixin ; Zhang, Guoshuang</creator><creatorcontrib>Wang, An ; Wang, Ce ; Zheng, Xuexin ; Tian, Weina ; Xu, Rixin ; Zhang, Guoshuang</creatorcontrib><description>•Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown. The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers). [Display omitted]</description><identifier>ISSN: 0045-7906</identifier><identifier>EISSN: 1879-0755</identifier><identifier>DOI: 10.1016/j.compeleceng.2017.05.007</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Algorithms ; Computer systems ; Correlation analysis ; Cryptography ; Embedded systems ; Multiplexers ; Multiplexing ; NTRU ; Power analysis attacks ; Random key rotation ; Resource-limited devices ; Side-channel attacks ; Smart cards ; Wearable technology</subject><ispartof>Computers &amp; electrical engineering, 2017-10, Vol.63, p.220-231</ispartof><rights>2017</rights><rights>Copyright Elsevier BV Oct 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-ddc8687b251bf341b6131cfcb1a1d128fff10778a9de0dab3b6444f3c11a3ebe3</citedby><cites>FETCH-LOGICAL-c349t-ddc8687b251bf341b6131cfcb1a1d128fff10778a9de0dab3b6444f3c11a3ebe3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.compeleceng.2017.05.007$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Wang, An</creatorcontrib><creatorcontrib>Wang, Ce</creatorcontrib><creatorcontrib>Zheng, Xuexin</creatorcontrib><creatorcontrib>Tian, Weina</creatorcontrib><creatorcontrib>Xu, Rixin</creatorcontrib><creatorcontrib>Zhang, Guoshuang</creatorcontrib><title>Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices</title><title>Computers &amp; electrical engineering</title><description>•Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown. The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers). [Display omitted]</description><subject>Algorithms</subject><subject>Computer systems</subject><subject>Correlation analysis</subject><subject>Cryptography</subject><subject>Embedded systems</subject><subject>Multiplexers</subject><subject>Multiplexing</subject><subject>NTRU</subject><subject>Power analysis attacks</subject><subject>Random key rotation</subject><subject>Resource-limited devices</subject><subject>Side-channel attacks</subject><subject>Smart cards</subject><subject>Wearable technology</subject><issn>0045-7906</issn><issn>1879-0755</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNqNkM1LAzEQxYMoWKv_Q8TzrjPdj-x6k-IXiIK255BNJpra3dQkFfrfu1IPHj0NA--9mfdj7BwhR8D6cpVr329oTZqGt3wGKHKocgBxwCbYiDYDUVWHbAJQVplooT5mJzGuYNxrbCase1GD8T3_oB0PPqnk_HDFX52hTL-rYaA11347JAo9qbgNxL3lT4uXJddht0k-7mKinlsfeKDot0FTtna9S2S4oS-nKZ6yI6vWkc5-55Qtb28W8_vs8fnuYX79mOmibFNmjG7qRnSzCjtblNjVWKC2ukOFBmeNtRZBiEa1hsCorujqsixtoRFVQR0VU3axz90E_7mlmORq_GcYT0psRQ0wq9pqVLV7lQ4-xkBWboLrVdhJBPmDVK7kH6TyB6mESo5IR-9876WxxpejIKN2NGgyLpBO0nj3j5RvUF6H2A</recordid><startdate>201710</startdate><enddate>201710</enddate><creator>Wang, An</creator><creator>Wang, Ce</creator><creator>Zheng, Xuexin</creator><creator>Tian, Weina</creator><creator>Xu, Rixin</creator><creator>Zhang, Guoshuang</creator><general>Elsevier Ltd</general><general>Elsevier BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201710</creationdate><title>Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices</title><author>Wang, An ; Wang, Ce ; Zheng, Xuexin ; Tian, Weina ; Xu, Rixin ; Zhang, Guoshuang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-ddc8687b251bf341b6131cfcb1a1d128fff10778a9de0dab3b6444f3c11a3ebe3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Algorithms</topic><topic>Computer systems</topic><topic>Correlation analysis</topic><topic>Cryptography</topic><topic>Embedded systems</topic><topic>Multiplexers</topic><topic>Multiplexing</topic><topic>NTRU</topic><topic>Power analysis attacks</topic><topic>Random key rotation</topic><topic>Resource-limited devices</topic><topic>Side-channel attacks</topic><topic>Smart cards</topic><topic>Wearable technology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, An</creatorcontrib><creatorcontrib>Wang, Ce</creatorcontrib><creatorcontrib>Zheng, Xuexin</creatorcontrib><creatorcontrib>Tian, Weina</creatorcontrib><creatorcontrib>Xu, Rixin</creatorcontrib><creatorcontrib>Zhang, Guoshuang</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; electrical engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, An</au><au>Wang, Ce</au><au>Zheng, Xuexin</au><au>Tian, Weina</au><au>Xu, Rixin</au><au>Zhang, Guoshuang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices</atitle><jtitle>Computers &amp; electrical engineering</jtitle><date>2017-10</date><risdate>2017</risdate><volume>63</volume><spage>220</spage><epage>231</epage><pages>220-231</pages><issn>0045-7906</issn><eissn>1879-0755</eissn><abstract>•Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown. The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers). [Display omitted]</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.compeleceng.2017.05.007</doi><tpages>12</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0045-7906
ispartof Computers & electrical engineering, 2017-10, Vol.63, p.220-231
issn 0045-7906
1879-0755
language eng
recordid cdi_proquest_journals_1976002595
source ScienceDirect Journals (5 years ago - present)
subjects Algorithms
Computer systems
Correlation analysis
Cryptography
Embedded systems
Multiplexers
Multiplexing
NTRU
Power analysis attacks
Random key rotation
Resource-limited devices
Side-channel attacks
Smart cards
Wearable technology
title Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T19%3A15%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Random%20key%20rotation:%20Side-channel%20countermeasure%20of%20NTRU%20cryptosystem%20for%20resource-limited%20devices&rft.jtitle=Computers%20&%20electrical%20engineering&rft.au=Wang,%20An&rft.date=2017-10&rft.volume=63&rft.spage=220&rft.epage=231&rft.pages=220-231&rft.issn=0045-7906&rft.eissn=1879-0755&rft_id=info:doi/10.1016/j.compeleceng.2017.05.007&rft_dat=%3Cproquest_cross%3E1976002595%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1976002595&rft_id=info:pmid/&rft_els_id=S0045790617312740&rfr_iscdi=true