A 3.40ms/GF(p521) and 2.77ms/GF(2521) DF-ECC processor with side-channel attack resistance

Jen Wei Lee*, Szu Chi Chung, Hsie-Chia Chang, Chen-Yi Lee

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

Public-key cryptosystems (Fig. 3.3.1) have been widely developed for ensuring the security of information exchange in network communications, financial markets, private data storage, and personal identification devices. In contrast to the well-known RSA algorithm, elliptic curve cryptography (ECC) provides the same security level with a shorter key size. As specified in IEEE P1363 (Standard Specifications for Public Key Cryptography), ECC arithmetic is required to provide not only dual-field operations over GF(p) and GF(2 m) but also arbitrary elliptic curves (EC) for different requirements, such as encryption, signature, and key exchange. In this paper, a solution supporting a 521b key size is proposed to accelerate the most time-critical elliptic curve scalar multiplication (ECSM). It computes multiple points KP = P + P +... + P, where K is the private key and P is an EC point. In addition, side-channel attack resistance is implemented to prevent information leakage from simple power-analysis (SPA), differential power-analysis (DPA) [1], zero-value point (ZVP) [2], and doubling attacks [3].

Original languageEnglish
Title of host publication2013 IEEE International Solid-State Circuits Conference, ISSCC 2013 - Digest of Technical Papers
Pages50-51
Number of pages2
DOIs
StatePublished - 2013
Event2013 60th IEEE International Solid-State Circuits Conference, ISSCC 2013 - San Francisco, CA, United States
Duration: 17 Feb 201321 Feb 2013

Publication series

NameDigest of Technical Papers - IEEE International Solid-State Circuits Conference
Volume56
ISSN (Print)0193-6530

Conference

Conference2013 60th IEEE International Solid-State Circuits Conference, ISSCC 2013
Country/TerritoryUnited States
CitySan Francisco, CA
Period17/02/1321/02/13

Fingerprint

Dive into the research topics of 'A 3.40ms/GF(p521) and 2.77ms/GF(2521) DF-ECC processor with side-channel attack resistance'. Together they form a unique fingerprint.

Cite this