Abstract

The NTRU algorithm, as IEEE P1363.1 standard, has been widely applied in resource-limited cryptosystems such as wearable embedded systems, smart cards, and so on. In 2013, Zheng et al. presented collision attack on three NTRU countermeasures from Lee et al., which are the only three countermeasures of NTRU against side-channel analysis so far. In this paper, we give a new countermeasure named Random Key Rotation (RKR) against the existing statistical side-channel analysis. According to analysis and experiments on STC89C52 microprocessor, little information of the key is leaked by collision attack, second-order correlation power analysis, etc. Furthermore, implementation schemes of RKR countermeasure in software and hardware are suggested. Under typical parameters, barrel shifter implementation of RKR only costs 8-bit extra register and one extra clock cycle (as well as 16 extra multiplexers).

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call