Differential Power Analysis (DPA) Attack on Dual Field ECC Processor for Cryptographic Applications

Exchange of private information over a public medium must incorporate a method for data protection against unauthorized access. Elliptic curve cryptography is one of the best public key cryptography algorithm as it provides high security at lesser bit sizes than RSA and also it operates with higher throughput, lower power consumption, and lesser area requirements .The Elliptic curve cryptography processor focuses on the analysis and counteracts of elliptic curve implementations against side-channel attacks. When simple power analysis is not feasible differential power analysis can be tried. Differential power analysis tries to exploit the relationship between the processed data and the power consumption.

Provided by: IJESIT Topic: Security Date Added: Mar 2013 Format: PDF

Find By Topic