NTRUEncrypt is a family of public key cryptosystems that uses lattice-based cryptography. It has been accepted as an IEEE P1363 standard and as an X9.98 Standard. In addition to its small footprint compared to other number theory based public key systems, its resistance to quantum attacks makes it a very attractive candidate for post quantum cryptography systems. On the other hand, similar to other cryptographic schemes, unprotected hardware implementations of NTRUEncrypt are susceptible to side channel attacks such as timing and power analysis. In this paper, we present an FPGA implementation of NTRUEncrypt which is resistant to first order differential power analysis (DPA) attacks. Our countermeasures are implemented at the architecture level. In particular, we split the ciphertext into two randomly generated shares. This guarantees that during the first step of the decryption process, the inputs to the convolution modules, which are convoluted with the secret key polynomial, are uniformly chosen random polynomials which are freshly generated for each convolution operation and are not under the control of the attacker. The two shares are then processed in parallel without explicitly combining them until the final stage of the decryption. Furthermore, during the final stage of the decryption, we also split the used secret key polynomial into two randomly generated shares which provides theoretical resistance against the considered class of power analysis attacks. The proposed architecture is implemented using Altera Cyclone IV FPGA and simulated on Quartus II in order to compare the non-masked architecture with the masked one. For the considered set of parameters, the area overhead of the protected implementation is about 60% while the latency overhead is between 1.4% to 6.9%.
[1]
Joseph H. Silverman,et al.
NTRU: A Ring-Based Public Key Cryptosystem
,
1998,
ANTS.
[2]
Frederik Vercauteren,et al.
Masking ring-LWE
,
2016,
Journal of Cryptographic Engineering.
[3]
Kyle Wilhelm,et al.
Aspects of hardware methodologies for the NTRU public-key cryptosystem
,
2008
.
[4]
Paul C. Kocher,et al.
Differential Power Analysis
,
1999,
CRYPTO.
[5]
Vincent Rijmen,et al.
A Side-Channel Analysis Resistant Description of the AES S-Box
,
2005,
FSE.
[6]
Abdel Alim Kamal,et al.
Strengthening hardware implementations of NTRUEncrypt against fault analysis attacks
,
2013,
Journal of Cryptographic Engineering.
[7]
J. Hoffstein,et al.
Ntru: a Public Key Cryptosystem
,
1999
.
[8]
Joseph H. Silverman,et al.
NTRU in Constrained Devices
,
2001,
CHES.
[9]
Christophe Clavier,et al.
Correlation Power Analysis with a Leakage Model
,
2004,
CHES.
[10]
Johannes Blömer,et al.
Provably Secure Masking of AES
,
2004,
IACR Cryptol. ePrint Arch..
[11]
A. A. Kamal,et al.
An FPGA implementation of the NTRUEncrypt cryptosystem
,
2009,
2009 International Conference on Microelectronics - ICM.
[12]
Huapeng Wu,et al.
Efficient architecture and implementation for NTRUEncrypt system
,
2015,
2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS).
[13]
Dooho Choi,et al.
Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
,
2010,
IEICE Trans. Fundam. Electron. Commun. Comput. Sci..