Abstract
The NTRU cryptosystem is a public key system based on lattice problems. While its theoretical security has been well studied, little effort has been made to analyze its security against implementation attacks including power analysis attacks. In this paper, we show that a typical software implementation of NTRU is vulnerable to the simple power analysis and the correlation power analysis including a second-order power attack. We also present novel countermeasures to prevent these attacks, and perform experiments to estimate the performance overheads of our countermeasures. According to our experimental results, the overheads in required memory and execution time are only 8.17% and 9.56%, respectively over a Tmote Sky equipped with an MSP430 processor. © 2010 The Institute of Electronics, Information and Communication Engineers.
Author supplied keywords
Cite
CITATION STYLE
Lee, M. K., Song, J. E., Choi, D., & Han, D. G. (2010). Countermeasures against power analysis attacks for the NTRU public Key cryptosystem. In IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Vol. E93-A, pp. 153–163). Institute of Electronics, Information and Communication, Engineers, IEICE. https://doi.org/10.1587/transfun.E93.A.153
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.