Font Size: a A A

Research On Key Technologies Of Elliptic Curve Cryptography Processor With Power Analysis Attacks Resistance

Posted on:2018-12-31Degree:DoctorType:Dissertation
Country:ChinaCandidate:Z L LiuFull Text:PDF
GTID:1318330515972956Subject:Microelectronics and Solid State Electronics
Abstract/Summary:PDF Full Text Request
Elliptic Curve Cryptography is a kind of public key cryptographic algorithms.It can be widely used in data encryption,digital signature and key management.Compared to RSA,ECC gets more secure,faster and shorter key size.It is well suited for smart card and mobile device applications which the computation power,storage space and hardware resource are constrained.On the other hand,the attacks for cryptographic device are endless.Power analysis attack is a new kind of attack method which exploits the leakage power information to expose the key and is a new huge threat to ECC hardware device.In this paper,aiming at security,low cost,hardware efficiency and flexibility,we develop the following key technologies for ECC algorithm with power analysis attack resistances,hardware implementation and true random number generator.For the power analysis attack about ECC,we have done some researches on the SPA,DPA,ZPA and DA attack methods.An FPGA-based power analysis attack platform has been built.The Montgomery ladder algorithm with randomized projective coordinates method has been studied,and it is found that it cannot resist ZPA attack.Therefore,a randomized serial modular multiplication has been proposed to eliminate the influence of zero-value coordinates on the power consumption.We also do some researches on the point generation of elliptic curve in dual-field,and an improved binary algorithm for the JacobiSymbol has been proposed.The random number is widely used in power analysis attack resistances and cryptographic protocol.A low-cost true random number generator(TRNG)has been designed in this thesis.The oscillator sampling technique is exploited,and a tetrahedral oscillator with large jitter has been employed to realize the TRNG And we have done some researches about the relationship between device parameters and the randomness.To improve the uniform distribution of output bits,a post-processor is proposed based on a new diffusion algorithm.The proposed TRNG has passed the National Institute of Standards and Technology SP800-22 tests and Diehard tests.For the low-cost applications,such as RFID,smart card,we have designed a low-cost ECC processor in binary field with power analysis attack resistance.The Montgomery ladder algorithm with randomized projective coordinates method is adopted to resist SPA and DPA,but it cannot resist ZPA attack.Therefore,we adopt the proposed randomized MSB modular multiplication,and it can expand to be randomized MSD modular multiplication.Based on it,we have designed a new randomized modular arithmetic logic unit(MALU).It can support the operations of modular addition,modular multiplication and modular squaring.A coordinate swapping method has been proposed to reduce the complexity of the controller and shorten the time of iterative calculation.A new modular inversion method which requires fewer registers is used to store variables than the traditional schemes.A modified circular shift register architecture is presented in this paper which is an effective way to reduce the area of register files.The results show that the design of ECC processor in binary field can resist SPA,DPA,ZPA and DA effectively.For the support of a variety of ECC standards to be compatible with different security applications,in this paper,an efficient and flexible dual-field ECC processor has been proposed which can support arbitrary elliptic curve and the field length up to 576bits.In order to reduce the data path delay and improve the calculation speed,an improved Radix-4 interleaved modular multiplication has been proposed.The CSA and CPA are used and a new modular adder/subtractor of three operands has been proposed.We have also optimized the hardware architecture of modular doubling,modular quadrupling and modular inversion.And then,an elaborate modular arithmetic logic unit is designed.It can perform basic modular arithmetic operations and achieve high hardware efficiency.Based on our designed instruction set,the ECC processor can be programmed to perform various point operations based on different algorithms.To demonstrate the flexibility of our processor,a point multiplication algorithm with randomized point coordinates is adopted.It can resist the power analysis attacks of SPA,DPA,ZPA and DA.
Keywords/Search Tags:Power Analysis Attack, Elliptic Curve Cryptography, True Random Number Generator, Low Cost, Hardware Efficience
PDF Full Text Request
Related items