Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices

An Wang*, Ce Wang, Xuexin Zheng, Weina Tian, Rixin Xu, Guoshuang Zhang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers).

Original languageEnglish
Pages (from-to)220-231
Number of pages12
JournalComputers and Electrical Engineering
Volume63
DOIs
Publication statusPublished - Oct 2017

Keywords

  • NTRU
  • Power analysis attacks
  • Random key rotation
  • Resource-limited devices
  • Side-channel attacks

Fingerprint

Dive into the research topics of 'Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices'. Together they form a unique fingerprint.

Cite this