On the Complexity of Attacking Elliptic Curve Based Authentication Chips

dc.bibliographicCitation.firstPage103480eng
dc.bibliographicCitation.volume80eng
dc.contributor.authorKabin, Ievgen
dc.contributor.authorDyka, Zoya
dc.contributor.authorKlann, Dan
dc.contributor.authorSchaeffner, Jan
dc.contributor.authorLangendoerfer, Peter
dc.date.accessioned2022-03-29T08:33:53Z
dc.date.available2022-03-29T08:33:53Z
dc.date.issued2021
dc.description.abstractIn this paper we discuss the difficulties of mounting successful attacks against crypto implementations if essential information is missing. We start with a detailed description of our attack against our own design, to highlight which information is needed to increase the success of an attack, i.e. we use it as a blueprint to the following attack against commercially available crypto chips. We would like to stress that our attack against our own design is very similar to what happens during certification e.g. according to the Common Criteria Standard as in those cases the manufacturer needs to provide detailed information. If attacking commercial designs without signing NDAs, we were forced to intensively search the Internet for information about the designs. We were able to reveal information on the processing sequence during the authentication process even as detailed as identifying the clock cycles in which the individual key bits are processed. But we could not reveal the private keys used by the attacked commercial authentication chips 100% correctly. Moreover, as we did not knew the used keys we could not evaluate the success of our attack. To summarize, the effort of such an attack is significantly higher than the one of attacking a well-known implementation.eng
dc.description.versionpublishedVersioneng
dc.identifier.urihttps://oa.tib.eu/renate/handle/123456789/8422
dc.identifier.urihttps://doi.org/10.34657/7460
dc.language.isoengeng
dc.publisherAmsterdam [u.a.] : Elseviereng
dc.relation.doihttps://doi.org/10.1016/j.micpro.2020.103480
dc.relation.essn1872-9436
dc.relation.ispartofseriesMicroprocessors and microsystems 80 (2021)eng
dc.rights.licenseCC BY 4.0 Unportedeng
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/eng
dc.subjectECCeng
dc.subjectECDHeng
dc.subjectelectromagnetic analysiseng
dc.subjectFPGA implementationeng
dc.subjecthorizontal attackseng
dc.subjectInfineon Trust Beng
dc.subjectNXP A1006eng
dc.subjectproduct piracyeng
dc.subjectSecure Authenticationeng
dc.subjectSide Channel Analysis (SCA) Attackseng
dc.subject.ddc510eng
dc.titleOn the Complexity of Attacking Elliptic Curve Based Authentication Chipseng
dc.typearticleeng
dc.typeTexteng
dcterms.bibliographicCitation.journalTitleMicroprocessors and microsystemseng
tib.accessRightsopenAccesseng
wgl.contributorIHPeng
wgl.subjectMathematikeng
wgl.typeZeitschriftenartikeleng
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
On_the_Complexity_of_Attacking_Commercial.pdf
Size:
9.94 MB
Format:
Adobe Portable Document Format
Description:
Collections