Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices
•Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown. The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limi...
Gespeichert in:
Veröffentlicht in: | Computers & electrical engineering 2017-10, Vol.63, p.220-231 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 231 |
---|---|
container_issue | |
container_start_page | 220 |
container_title | Computers & electrical engineering |
container_volume | 63 |
creator | Wang, An Wang, Ce Zheng, Xuexin Tian, Weina Xu, Rixin Zhang, Guoshuang |
description | •Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown.
The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers).
[Display omitted] |
doi_str_mv | 10.1016/j.compeleceng.2017.05.007 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1976002595</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0045790617312740</els_id><sourcerecordid>1976002595</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-ddc8687b251bf341b6131cfcb1a1d128fff10778a9de0dab3b6444f3c11a3ebe3</originalsourceid><addsrcrecordid>eNqNkM1LAzEQxYMoWKv_Q8TzrjPdj-x6k-IXiIK255BNJpra3dQkFfrfu1IPHj0NA--9mfdj7BwhR8D6cpVr329oTZqGt3wGKHKocgBxwCbYiDYDUVWHbAJQVplooT5mJzGuYNxrbCase1GD8T3_oB0PPqnk_HDFX52hTL-rYaA11347JAo9qbgNxL3lT4uXJddht0k-7mKinlsfeKDot0FTtna9S2S4oS-nKZ6yI6vWkc5-55Qtb28W8_vs8fnuYX79mOmibFNmjG7qRnSzCjtblNjVWKC2ukOFBmeNtRZBiEa1hsCorujqsixtoRFVQR0VU3axz90E_7mlmORq_GcYT0psRQ0wq9pqVLV7lQ4-xkBWboLrVdhJBPmDVK7kH6TyB6mESo5IR-9876WxxpejIKN2NGgyLpBO0nj3j5RvUF6H2A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1976002595</pqid></control><display><type>article</type><title>Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices</title><source>ScienceDirect Journals (5 years ago - present)</source><creator>Wang, An ; Wang, Ce ; Zheng, Xuexin ; Tian, Weina ; Xu, Rixin ; Zhang, Guoshuang</creator><creatorcontrib>Wang, An ; Wang, Ce ; Zheng, Xuexin ; Tian, Weina ; Xu, Rixin ; Zhang, Guoshuang</creatorcontrib><description>•Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown.
The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers).
[Display omitted]</description><identifier>ISSN: 0045-7906</identifier><identifier>EISSN: 1879-0755</identifier><identifier>DOI: 10.1016/j.compeleceng.2017.05.007</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Algorithms ; Computer systems ; Correlation analysis ; Cryptography ; Embedded systems ; Multiplexers ; Multiplexing ; NTRU ; Power analysis attacks ; Random key rotation ; Resource-limited devices ; Side-channel attacks ; Smart cards ; Wearable technology</subject><ispartof>Computers & electrical engineering, 2017-10, Vol.63, p.220-231</ispartof><rights>2017</rights><rights>Copyright Elsevier BV Oct 2017</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-ddc8687b251bf341b6131cfcb1a1d128fff10778a9de0dab3b6444f3c11a3ebe3</citedby><cites>FETCH-LOGICAL-c349t-ddc8687b251bf341b6131cfcb1a1d128fff10778a9de0dab3b6444f3c11a3ebe3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.compeleceng.2017.05.007$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Wang, An</creatorcontrib><creatorcontrib>Wang, Ce</creatorcontrib><creatorcontrib>Zheng, Xuexin</creatorcontrib><creatorcontrib>Tian, Weina</creatorcontrib><creatorcontrib>Xu, Rixin</creatorcontrib><creatorcontrib>Zhang, Guoshuang</creatorcontrib><title>Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices</title><title>Computers & electrical engineering</title><description>•Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown.
The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers).
[Display omitted]</description><subject>Algorithms</subject><subject>Computer systems</subject><subject>Correlation analysis</subject><subject>Cryptography</subject><subject>Embedded systems</subject><subject>Multiplexers</subject><subject>Multiplexing</subject><subject>NTRU</subject><subject>Power analysis attacks</subject><subject>Random key rotation</subject><subject>Resource-limited devices</subject><subject>Side-channel attacks</subject><subject>Smart cards</subject><subject>Wearable technology</subject><issn>0045-7906</issn><issn>1879-0755</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNqNkM1LAzEQxYMoWKv_Q8TzrjPdj-x6k-IXiIK255BNJpra3dQkFfrfu1IPHj0NA--9mfdj7BwhR8D6cpVr329oTZqGt3wGKHKocgBxwCbYiDYDUVWHbAJQVplooT5mJzGuYNxrbCase1GD8T3_oB0PPqnk_HDFX52hTL-rYaA11347JAo9qbgNxL3lT4uXJddht0k-7mKinlsfeKDot0FTtna9S2S4oS-nKZ6yI6vWkc5-55Qtb28W8_vs8fnuYX79mOmibFNmjG7qRnSzCjtblNjVWKC2ukOFBmeNtRZBiEa1hsCorujqsixtoRFVQR0VU3axz90E_7mlmORq_GcYT0psRQ0wq9pqVLV7lQ4-xkBWboLrVdhJBPmDVK7kH6TyB6mESo5IR-9876WxxpejIKN2NGgyLpBO0nj3j5RvUF6H2A</recordid><startdate>201710</startdate><enddate>201710</enddate><creator>Wang, An</creator><creator>Wang, Ce</creator><creator>Zheng, Xuexin</creator><creator>Tian, Weina</creator><creator>Xu, Rixin</creator><creator>Zhang, Guoshuang</creator><general>Elsevier Ltd</general><general>Elsevier BV</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201710</creationdate><title>Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices</title><author>Wang, An ; Wang, Ce ; Zheng, Xuexin ; Tian, Weina ; Xu, Rixin ; Zhang, Guoshuang</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-ddc8687b251bf341b6131cfcb1a1d128fff10778a9de0dab3b6444f3c11a3ebe3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Algorithms</topic><topic>Computer systems</topic><topic>Correlation analysis</topic><topic>Cryptography</topic><topic>Embedded systems</topic><topic>Multiplexers</topic><topic>Multiplexing</topic><topic>NTRU</topic><topic>Power analysis attacks</topic><topic>Random key rotation</topic><topic>Resource-limited devices</topic><topic>Side-channel attacks</topic><topic>Smart cards</topic><topic>Wearable technology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wang, An</creatorcontrib><creatorcontrib>Wang, Ce</creatorcontrib><creatorcontrib>Zheng, Xuexin</creatorcontrib><creatorcontrib>Tian, Weina</creatorcontrib><creatorcontrib>Xu, Rixin</creatorcontrib><creatorcontrib>Zhang, Guoshuang</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & electrical engineering</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Wang, An</au><au>Wang, Ce</au><au>Zheng, Xuexin</au><au>Tian, Weina</au><au>Xu, Rixin</au><au>Zhang, Guoshuang</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices</atitle><jtitle>Computers & electrical engineering</jtitle><date>2017-10</date><risdate>2017</risdate><volume>63</volume><spage>220</spage><epage>231</epage><pages>220-231</pages><issn>0045-7906</issn><eissn>1879-0755</eissn><abstract>•Random key rotation (RKR) scheme for NTRU cryptosystem is proposed.•RKR can protect NTRU against the existing side-channel attacks.•Efficient RKR implementations by the way of both speed and area first are shown.
The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers).
[Display omitted]</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.compeleceng.2017.05.007</doi><tpages>12</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0045-7906 |
ispartof | Computers & electrical engineering, 2017-10, Vol.63, p.220-231 |
issn | 0045-7906 1879-0755 |
language | eng |
recordid | cdi_proquest_journals_1976002595 |
source | ScienceDirect Journals (5 years ago - present) |
subjects | Algorithms Computer systems Correlation analysis Cryptography Embedded systems Multiplexers Multiplexing NTRU Power analysis attacks Random key rotation Resource-limited devices Side-channel attacks Smart cards Wearable technology |
title | Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T19%3A15%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Random%20key%20rotation:%20Side-channel%20countermeasure%20of%20NTRU%20cryptosystem%20for%20resource-limited%20devices&rft.jtitle=Computers%20&%20electrical%20engineering&rft.au=Wang,%20An&rft.date=2017-10&rft.volume=63&rft.spage=220&rft.epage=231&rft.pages=220-231&rft.issn=0045-7906&rft.eissn=1879-0755&rft_id=info:doi/10.1016/j.compeleceng.2017.05.007&rft_dat=%3Cproquest_cross%3E1976002595%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1976002595&rft_id=info:pmid/&rft_els_id=S0045790617312740&rfr_iscdi=true |