EC Scalar Multiplication: Successful Simple Address Bit SCA Attack against Atomic Patterns

06/23/2021
by   Ievgen Kabin, et al.
0

In this work we discuss the resistance of atomic pattern algorithms for elliptic curve point multiplication against simple side channel analysis attacks using our own implementation as an example. The idea of the atomicity principle is to make kP implementations resistant against simple side channel analysis attacks. One of the assumptions, on which the atomicity principle is based, is the indistinguishability of register operations, i.e. two write-to-register operations cannot be distinguished if their old and new data values are the same. But before the data can be stored to a register/block, this register/block has to be addressed for storing the data. Different registers/blocks have different addresses. In praxis, this different and key dependent addressing can be used to reveal the key, even by running simple SCA attacks. The key dependent addressing of registers/blocks allows to reveal the key and is an inherent feature of the binary kP algorithms. This means that the assumption, that addressing of different registers/blocks is an indistinguishable operation, may no longer be applied when realizing kP implementations, at least not for hardware implementations.

READ FULL TEXT

page 1

page 3

research
01/05/2022

Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA

Side Channel Analysis attacks take advantage of the information leaked f...
research
04/05/2021

Near-Precise Parameter Approximation for Multiple Multiplications on A Single DSP Block

A multiply-accumulate (MAC) operation is the main computation unit for D...
research
01/08/2022

Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula

Due to the nature of applications such as critical infrastructure and th...
research
01/05/2022

Clustering versus Statistical Analysis for SCA: when Machine Learning is Better

Evaluation of the resistance of implemented cryptographic algorithms aga...
research
10/19/2017

A Survey on Hardware Implementations of Elliptic Curve Cryptosystems

In the past two decades, Elliptic Curve Cryptography (ECC) have become i...
research
01/06/2022

Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA

In this paper we describe our flexible ECDSA design for elliptic curve o...
research
01/04/2022

Unified Field Multiplier for ECC: Inherent Resistance against Horizontal SCA Attacks

In this paper we introduce a unified field multiplier for the EC kP oper...

Please sign up or login with your details

Forgot password? Click here to reset