A random M-ary method based countermeasure against side channel attacks

  • Authors:
  • MahnKi Ahn;JaeCheol Ha;HoonJae Lee;SangJae Moon

  • Affiliations:
  • Mobile Network Security Technology Research Center, Kyungpook National University, Daegu, Korea;Korea Nazarene University, Cheonan, Choongnam, Korea;Dongseo University, Busan, Korea;Mobile Network Security Technology Research Center, Kyungpook National University, Daegu, Korea

  • Venue:
  • ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartII
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side channel attacks. This paper proposes a countermeasure against simple and differential power analyses attacks through randomizing the transformed m-ary method based on a random m-ary recoding algorithm. Therefore, the power consumption is independent of the secret key. We show that the proposed algorithm has fewer computational cost than the previous countermeasures against power attacks in ECC. Accordingly, since the variable window width arrays and random computational tracks can resist against the SPA and DPA, the proposed countermeasure can provide a higher security for smartcards.