Practical Evaluation of Masking for NTRUEncrypt on ARM Cortex-M4

To protect against the future threat of large scale quantum computing, cryptographic schemes that are considered appropriately secure against known quantum algorithms have gained in popularity and are currently in the process of standardization by NIST. One of the more promising so-called post-quantum schemes is NTRUEncrypt, which withstood scrutiny from the scientific community for over 20 years.

[1]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[2]  Joseph H. Silverman,et al.  Optimizations for NTRU , 2001 .

[3]  Joseph H. Silverman,et al.  NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.

[4]  William Whyte,et al.  Choosing Parameters for NTRUEncrypt , 2017, CT-RSA.

[5]  Pankaj Rohatgi,et al.  Towards Sound Approaches to Counteract Power-Analysis Attacks , 1999, CRYPTO.

[6]  Markus Kasper,et al.  The World is Not Enough: Another Look on Second-Order DPA , 2010, IACR Cryptol. ePrint Arch..

[7]  William Whyte,et al.  Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 , 2005, IACR Cryptol. ePrint Arch..

[8]  Sarah Meiklejohn,et al.  Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008 , 2010, SIGA.

[9]  Joseph H. Silverman,et al.  NTRU in Constrained Devices , 2001, CHES.

[10]  Dooho Choi,et al.  Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[11]  An Wang,et al.  Random key rotation: Side-channel countermeasure of NTRU cryptosystem for resource-limited devices , 2017, Comput. Electr. Eng..

[12]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[13]  An Wang,et al.  First-order collision attack on protected NTRU cryptosystem , 2013, Microprocess. Microsystems.