TY - JOUR
T1 - Random key rotation
T2 - Side-channel countermeasure of NTRU cryptosystem for resource-limited devices
AU - Wang, An
AU - Wang, Ce
AU - Zheng, Xuexin
AU - Tian, Weina
AU - Xu, Rixin
AU - Zhang, Guoshuang
N1 - Publisher Copyright:
© 2017
PY - 2017/10
Y1 - 2017/10
N2 - The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers).
AB - The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers).
KW - NTRU
KW - Power analysis attacks
KW - Random key rotation
KW - Resource-limited devices
KW - Side-channel attacks
UR - http://www.scopus.com/inward/record.url?scp=85019089608&partnerID=8YFLogxK
U2 - 10.1016/j.compeleceng.2017.05.007
DO - 10.1016/j.compeleceng.2017.05.007
M3 - Article
AN - SCOPUS:85019089608
SN - 0045-7906
VL - 63
SP - 220
EP - 231
JO - Computers and Electrical Engineering
JF - Computers and Electrical Engineering
ER -