Methods increasing inherent resistance of ECC designs against horizontal attacks

dc.bibliographicCitation.firstPage50eng
dc.bibliographicCitation.lastPage67eng
dc.bibliographicCitation.volume73eng
dc.contributor.authorKabin, Ievgen
dc.contributor.authorDyka, Zoya
dc.contributor.authorKlann, Dan
dc.contributor.authorLangendoerfer, Peter
dc.date.accessioned2022-10-10T08:41:04Z
dc.date.available2022-10-10T08:41:04Z
dc.date.issued2020
dc.description.abstractDue to the nature of applications such as critical infrastructure and the Internet of Things etc. side channel analysis attacks are becoming a serious threat. Side channel analysis attacks take advantage from the fact that the behaviour of crypto implementations can be observed and provides hints that simplify revealing keys. A new type of SCA is the so called horizontal differential SCA. In this paper we investigate two different approaches to increase the inherent resistance of our hardware accelerator for the kP operation. The first approach aims at reducing the impact of the addressing in our design by realizing a regular schedule of the addressing. In the second approach, we investigated how the formula used to implement the multiplication of GF(2n)-elements influences the results of horizontal DPA attacks against a Montgomery kP-implementation. We implemented 5 designs with different partial multipliers, i.e. based on different multiplication formulae. We used two different technologies, i.e. a 130 and a 250 nm technology, to simulate power traces for our analysis. We show that the implemented multiplication formula influences the success of horizontal attacks significantly. The combination of these two approaches leads to the most resistant design. For the 250 nm technology only 2 key candidates could be revealed with a correctness of about 70% which is a huge improvement given the fact that for the original design 7 key candidates achieved a correctness of more than 90%. For our 130 nm technology no key candidate was revealed with a correctness of more than 60%.eng
dc.description.versionpublishedVersioneng
dc.identifier.urihttps://oa.tib.eu/renate/handle/123456789/10235
dc.identifier.urihttp://dx.doi.org/10.34657/9271
dc.language.isoengeng
dc.publisherAmsterdam [u.a.] : Elsevier Scienceeng
dc.relation.doihttps://doi.org/10.1016/j.vlsi.2020.03.001
dc.relation.essn1872-7522
dc.relation.ispartofseriesIntegration 73 (2020)eng
dc.rights.licenseCC BY 4.0 Unportedeng
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/eng
dc.subjectAddress bit differential power analysis (DPA) attackseng
dc.subjectCountermeasure against side channel analysis (SCA) attackseng
dc.subjectField multiplicationeng
dc.subjectMultiplication methodseng
dc.subjectPower traceseng
dc.subjectRegular scheduleeng
dc.subject.ddc510eng
dc.titleMethods increasing inherent resistance of ECC designs against horizontal attackseng
dc.typearticleeng
dc.typeTexteng
dcterms.bibliographicCitation.journalTitleIntegrationeng
tib.accessRightsopenAccesseng
wgl.contributorIHPeng
wgl.subjectMathematikeng
wgl.typeZeitschriftenartikeleng
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
1-s2-0-S0167926019306078-main.pdf
Size:
5.8 MB
Format:
Adobe Portable Document Format
Description:
Collections