Countermeasures against power analysis attacks for the NTRU public Key cryptosystem

40Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The NTRU cryptosystem is a public key system based on lattice problems. While its theoretical security has been well studied, little effort has been made to analyze its security against implementation attacks including power analysis attacks. In this paper, we show that a typical software implementation of NTRU is vulnerable to the simple power analysis and the correlation power analysis including a second-order power attack. We also present novel countermeasures to prevent these attacks, and perform experiments to estimate the performance overheads of our countermeasures. According to our experimental results, the overheads in required memory and execution time are only 8.17% and 9.56%, respectively over a Tmote Sky equipped with an MSP430 processor. © 2010 The Institute of Electronics, Information and Communication Engineers.

Cite

CITATION STYLE

APA

Lee, M. K., Song, J. E., Choi, D., & Han, D. G. (2010). Countermeasures against power analysis attacks for the NTRU public Key cryptosystem. In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Vol. E93-A, pp. 153–163). Institute of Electronics, Information and Communication, Engineers, IEICE. https://doi.org/10.1587/transfun.E93.A.153

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free