Abstract
The NTRU cryptosystem is a public key system based on lattice problems. While its theoretical security has been well studied, little effort has been made to analyze its security against implementation attacks including power analysis attacks. In this paper, we show that a typical software implementation of NTRU is vulnerable to the simple power analysis and the correlation power analysis including a second-order power attack. We also present novel countermeasures to prevent these attacks, and perform experiments to estimate the performance overheads of our countermeasures. According to our experimental results, the overheads in required memory and execution time are only 8.17% and 9.56%, respectively over a Tmote Sky equipped with an MSP430 processor.
Original language | English |
---|---|
Pages (from-to) | 153-163 |
Number of pages | 11 |
Journal | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
Volume | E93-A |
Issue number | 1 |
DOIs | |
State | Published - Jan 2010 |
Keywords
- Correlation power analysis
- Countermeasure
- NTRU
- Power analysis attack
- Simple power analysis