Algorithm-based countermeasures against power analysis attacks for public-key cryptography SM2

Xiaowei Han, Beibei Wang, An Wang, Liji Wu, Woogeun Rhee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

SM2 is a public-key cryptography algorithm which is based on elliptic curves. Since the side channel leakage of devices can be used to deduce the information of secret keys, algorithms to implement SM2 need to be improved. In this paper, we propose an initialized masking scalar multiplication algorithm (IMSM), a modified atomic point doubling and point addition algorithm (MADA), and a transformed formula countermeasure (TFCS). Analysis shows they can resist Simple Power Analysis (SPA), Differential Power Analysis and Template Attacks. IMSM and MADA have been verified to resist SPA on FPGA board successfully. Compared to Binary Expansion with RIP algorithm, 28.6% calculations can be saved when the scalar is divided into four parts, which is rather fast.

Original languageEnglish
Title of host publicationProceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages435-439
Number of pages5
ISBN (Electronic)9781479974344
DOIs
Publication statusPublished - 20 Jan 2015
Externally publishedYes
Event10th International Conference on Computational Intelligence and Security, CIS 2014 - Kunming, Yunnan, China
Duration: 15 Nov 201416 Nov 2014

Publication series

NameProceedings - 2014 10th International Conference on Computational Intelligence and Security, CIS 2014

Conference

Conference10th International Conference on Computational Intelligence and Security, CIS 2014
Country/TerritoryChina
CityKunming, Yunnan
Period15/11/1416/11/14

Keywords

  • Elliptic curve cryptography
  • IMSM
  • MADA
  • SM2
  • TFCS

Fingerprint

Dive into the research topics of 'Algorithm-based countermeasures against power analysis attacks for public-key cryptography SM2'. Together they form a unique fingerprint.

Cite this