Kabin et al., 2019 - Google Patents
Horizontal DPA attacks against ECC: impact of implemented field multiplication formulaKabin et al., 2019
View PDF- Document ID
- 3752989556894491805
- Author
- Kabin I
- Dyka Z
- Klann D
- Langendoerfer P
- Publication year
- Publication venue
- 2019 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era (DTIS)
External Links
Snippet
Due to the nature of applications such as critical infrastructure and the Internet of Things etc. side channel analysis attacks are becoming a serious threat. Side channel analysis attacks take advantage from the fact that the behavior of crypto implementations can be observed …
- 238000004458 analytical method 0 abstract description 18
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/726—Inversion; Reciprocal calculation; Division of elements of a finite field
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/60—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers
- G06F7/72—Methods or arrangements for performing computations using a digital non-denominational number representation, i.e. number representation without radix; Computing devices using combinations of denominational and non-denominational quantity representations, e.g. using difunction pulse trains, STEELE computers, phase computers using residue arithmetic
- G06F7/724—Finite field arithmetic
- G06F7/725—Finite field arithmetic over elliptic curves
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7223—Randomisation as countermeasure against side channel attacks
- G06F2207/7233—Masking, e.g. (A**e)+r mod n
- G06F2207/7242—Exponent masking, i.e. key masking, e.g. A**(e+r) mod n; (k+r).P
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/48—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
- G06F7/52—Multiplying; Dividing
- G06F7/523—Multiplying only
- G06F7/53—Multiplying only in parallel-parallel fashion, i.e. both operands being entered in parallel
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/38—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
- G06F7/48—Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
- G06F7/50—Adding; Subtracting
- G06F7/505—Adding; Subtracting in bit-parallel fashion, i.e. having a different digit-handling circuit for each denomination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
- G06F2207/7271—Fault verification, e.g. comparing two values which should be the same, unless a computational fault occurred
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F7/00—Methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F7/58—Random or pseudo-random number generators
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/38—Indexing scheme relating to groups G06F7/38 - G06F7/575
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bauer et al. | Horizontal collision correlation attack on elliptic curves: –Extended Version– | |
Bauer et al. | Horizontal and vertical side-channel attacks against secure RSA implementations | |
EP2974094B1 (en) | Asymmetrically masked multiplication | |
Groß et al. | Higher-order side-channel protected implementations of KECCAK | |
US8457919B2 (en) | Process for testing the resistance of an integrated circuit to a side channel analysis | |
US20110246789A1 (en) | Integrated circuit protected against horizontal side channel analysis | |
Kabin et al. | Horizontal DPA attacks against ECC: impact of implemented field multiplication formula | |
Kabin et al. | Horizontal address-bit DPA against montgomery kP implementation | |
Dyka et al. | Inherent resistance of efficient ECC designs against SCA attacks | |
Amiel et al. | Distinguishing multiplications from squaring operations | |
Kabin et al. | Methods increasing inherent resistance of ECC designs against horizontal attacks | |
Järvinen et al. | Single-trace side-channel attacks on scalar multiplications with precomputations | |
Hanley et al. | Using templates to distinguish multiplications from squaring operations | |
Joye et al. | Side-Channel Analysis. | |
Kabin et al. | Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks | |
Avanzi | Side channel attacks on implementations of curve-based cryptographic primitives | |
CN110048840B (en) | Information processing method, system and related components based on RSA algorithm | |
Lee et al. | An efficient countermeasure against correlation power-analysis attacks with randomized montgomery operations for DF-ECC processor | |
Batina et al. | SCA-secure ECC in software–mission impossible? | |
Batina et al. | SoK: SCA-secure ECC in software–mission impossible? | |
Feix et al. | Defeating with fault injection a combined attack resistant exponentiation | |
Belenky et al. | Redundancy aes masking basis for attack mitigation (rambam) | |
Dyka et al. | Clockwise randomization of the observable behaviour of crypto ASICs to counter side channel attacks | |
Kabin et al. | Unified field multiplier for ECC: Inherent resistance against horizontal SCA attacks | |
Kabin et al. | Fast dual-field ECDSA accelerator with increased resistance against horizontal SCA attacks |