On Power-Analysis Resistant Hardware Implementations of ECC-Based Cryptosystems

被引:1
作者
Willi, Roman [1 ]
Curiger, Andreas [2 ]
Zbinden, Paul [1 ]
机构
[1] HSR Hsch Tech Rapperswil, IMES, CH-8640 Rapperswil, Switzerland
[2] Securosys SA, Technopk Str 1, CH-8005 Zurich, Switzerland
来源
19TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD 2016) | 2016年
关键词
Power Analysis; SPA; DPA; side channel; ECC Cryptosystem; ECDSA; FPGA; Balancing power consumption;
D O I
10.1109/DSD.2016.59
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Power-analysis (PA) based side-channel attacks are effective methods to attack RSA encryption systems and elliptic-curve cryptography (ECC). In this paper, we describe PA-based side-channel attacks aiming to extract the (randomly chosen) private key for an ECC-based cryptosystem in detail. We assume that for the cryptosystem to be attacked the private key will not be available for more than one basic operation. Hence, statistical methods, commonly applied in differential power analysis attacks to enhance the signal-to-noise ratio (SNR), may not be applied. To reach the required SNR for a successful attack, we have extended the analysis by frequency-selective filtering followed by data fragmentation and correlation. We show that the implementation of a "double-and-add-always" scheme for ECC point multiplication, which according to literature has been considered safe against simple PA, will not resist our analytical attack method. We argue that memory accesses are the root cause for a successful attack, and propose an extension of the double-and-add-always scheme to harden ECC hardware implementations adequately.
引用
收藏
页码:665 / 669
页数:5
相关论文
共 21 条
[1]  
Amiet D., 2016, EUR C DIG SYST DES D
[2]  
[Anonymous], 2014, ALGORITHMS KEY SIZE
[3]  
[Anonymous], 2001, Cryptogr Hardw Embed Syst-CHES'01 LNCS
[4]  
Coron JS, 1999, LECT NOTES COMPUT SC, V1717, P292
[5]  
De Mulder E, 2005, EUROCON 2005: THE INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL, VOL 1 AND 2 , PROCEEDINGS, P1879
[6]  
Di Battista J., 2009, SCS 09, V3, P1
[7]  
Digilent Inc, 2014, BAYS3 FPGA BOARD REF, P502
[8]  
Genkin D, 2014, LECT NOTES COMPUT SC, V8616, P444, DOI 10.1007/978-3-662-44371-2_25
[9]   The Temperature Side Channel and Heating Fault Attacks [J].
Hutter, Michael ;
Schmidt, Joern-Marc .
SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2013), 2014, 8419 :219-+
[10]  
Izu T., 2005, LNCS, V2551, P296