Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA Attacks

01/07/2022
by   Ievgen Kabin, et al.
0

Side-channel analysis attacks, especially horizontal DPA and DEMA attacks, are significant threats for cryptographic designs. In this paper we investigate to which extend different multiplication formulae and randomization of the field multiplier increase the resistance of an ECC design against horizontal attacks. We implemented a randomized sequence of the calculation of partial products for the field multiplication in order to increase the security features of the field multiplier. Additionally, we use the partial polynomial multiplier itself as a kind of countermeasure against DPA attacks. We demonstrate that the implemented classical multiplication formula can increase the inherent resistance of the whole ECC design. We also investigate the impact of the combination of these two approaches. For the evaluation we synthesized all these designs for a 250 nm gate library technologies, and analysed the simulated power traces. All investigated protection means help to decrease the success rate of attacks significantly: the correctness of the revealed key was decreased from 99

READ FULL TEXT
research
01/08/2022

Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula

Due to the nature of applications such as critical infrastructure and th...
research
01/04/2022

Unified Field Multiplier for ECC: Inherent Resistance against Horizontal SCA Attacks

In this paper we introduce a unified field multiplier for the EC kP oper...
research
01/08/2022

Horizontal Attacks against ECC: from Simulations to ASIC

In this paper we analyse the impact of different compile options on the ...
research
01/06/2022

Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA

In this paper we describe our flexible ECDSA design for elliptic curve o...
research
01/27/2022

CacheFX: A Framework for Evaluating Cache Security

Over the last two decades, the danger of sharing resources between progr...
research
07/08/2020

Power Side-Channel Attacks in Negative Capacitance Transistor (NCFET)

Side-channel attacks have empowered bypassing of cryptographic component...
research
01/05/2022

Clustering versus Statistical Analysis for SCA: when Machine Learning is Better

Evaluation of the resistance of implemented cryptographic algorithms aga...

Please sign up or login with your details

Forgot password? Click here to reset