2018
DOI: 10.1007/978-3-319-89500-0_20
|View full text |Cite
|
Sign up to set email alerts
|

Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks

Abstract: Side channel analysis attacks, especially horizontal DPA and DEMA attacks, are significant threats for cryptographic designs. In this paper we investigate to which extend different multiplication formulae and randomization of the field multiplier increase the resistance of an ECC design against horizontal attacks. We implemented a randomized sequence of the calculation of partial products for the field multiplication in order to increase the security features of the field multiplier. Additionally, we use the p… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…A vertical address bit DPA was reported in 2002 in [11]. A well-known fact is that traditional countermeasures against vertical attacks such as scalar randomization as well as the randomization of the EC point coordinates are not effective against vertical address bit DPA attacks [12]. We revealed the scalar k successfully performing a horizontal, i.e.…”
Section: B Implementation Details Of Our Kp Designmentioning
confidence: 80%
See 2 more Smart Citations
“…A vertical address bit DPA was reported in 2002 in [11]. A well-known fact is that traditional countermeasures against vertical attacks such as scalar randomization as well as the randomization of the EC point coordinates are not effective against vertical address bit DPA attacks [12]. We revealed the scalar k successfully performing a horizontal, i.e.…”
Section: B Implementation Details Of Our Kp Designmentioning
confidence: 80%
“…Additionally, the always active field multiplier is a kind of SCA protection due to the high fluctuation of its power consumption [9]. Traditional countermeasures against vertical data bit differential attacks [24] were not implemented in our design due to the fact, that the success of the horizontal address bit differential attacks does not depend on the:  EC point P processed in the analysed kP calculation [12] i.e. EC point blinding and randomization are not effective against horizontal (single trace) attacks  scalar k processed in the kP calculation [12].…”
Section: E Attacking Our Kp Design Running On Fpgamentioning
confidence: 99%
See 1 more Smart Citation
“…We implemented the field multiplier without any countermeasures against SCA, i.e. the sequence of the multiplication was not randomized as for example in [11], and multiplications are not masked. The investigated multiplier is inherently resistant against the performed attacks.…”
Section: Inherent Resistance Of Investigated Field Multipliermentioning
confidence: 99%
“…Well-known randomization techniques such as secret scalar randomization, randomization of the projective EC point coordinates or EC point blinding [24] are effective against vertical attacks, i.e., if key-dependent data processing is exploited to extract the key. However, they are not effective [25,26] against attacks exploiting the key-dependent addressing of the design blocks, i.e., their application when using atomic patterns does not prevent horizontal attacks that exploit the addressing from being successful. In other words, they do not prevent simple SCA attacks that are looking for highly fine-grained differences in the trace.…”
mentioning
confidence: 99%