2020
DOI: 10.1007/978-3-030-42051-2_5
|View full text |Cite
|
Sign up to set email alerts
|

Horizontal Attacks Against ECC: From Simulations to ASIC

Abstract: In this paper we analyse the impact of different compile options on the success rate of side channel analysis attacks. We run horizontal differential side channel attacks against simulated power traces for the same kP design synthesized using two different compile options after synthesis and after layout. As we are interested in the effect on the produced ASIC we also run the same attack against measured power traces after manufacturing the ASIC. We found that the compile_ultra option reduces the success rate … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…We improved the resistance of our implementation significantly using the horizontal differential analysis attacks as a tool for localizing SCA leakage sources [14]. The statistical analysis can be done using the Pearson correlation coefficients, or other statistical approaches, for example a comparison to the mean approach [15]. In the next subsection we describe shortly this attack against our kP design with the goal to show how easy and effective horizontal differential attacks against Montgomery kP algorithm implementations can be.…”
Section: B Implementation Details Of Our Kp Designmentioning
confidence: 99%
“…We improved the resistance of our implementation significantly using the horizontal differential analysis attacks as a tool for localizing SCA leakage sources [14]. The statistical analysis can be done using the Pearson correlation coefficients, or other statistical approaches, for example a comparison to the mean approach [15]. In the next subsection we describe shortly this attack against our kP design with the goal to show how easy and effective horizontal differential attacks against Montgomery kP algorithm implementations can be.…”
Section: B Implementation Details Of Our Kp Designmentioning
confidence: 99%
“…In [5], [10] the comparison to the mean attack was introduced. It is based on the fact that the measured kP trace is a sequence of the processing of '1' and '0' values of the scalar k. We call the samples in the trace representing the processing of a single bit of the scalar a slot.…”
Section: Comparison To the Mean Attackmentioning
confidence: 99%
“…Parameters of the designs synthesized for the 250 nm cell library are given in section III. Sections IV describes a horizontal DPA attack using the comparison to the mean [10] for revealing the key. Section V shortly describes an automated simple power analysis (SPA) attack.…”
Section: Introductionmentioning
confidence: 99%
“…The latter allows then impersonation, falsifying digital signatures etc. During our earlier work we learnt that the compiler options used during synthesis have a significant impact on the SCA vulnerability of the resulting implementation even for ASICs [1]. This triggered the idea that similar might hold true for FPGA implementations as well.…”
Section: Introductionmentioning
confidence: 99%