首页> 外文会议>IEEE International Symposium on Electromagnetic Compatibility >Hardware/software co-design flavors of elliptic curve scalar multiplication
【24h】

Hardware/software co-design flavors of elliptic curve scalar multiplication

机译:椭圆曲线标量乘法的硬件/软件协同设计风格

获取原文

摘要

Many electronic applications use cryptographic algorithms implemented in embedded devices to provide some form of security, e.g. smart cards (banking, SIM, access control), mobile phones, wifi routers, etc. The tight resource constraints of the devices, typically silicon area and power or energy, together with requirements from the application, typically latency or throughput, demand highly efficient implementations of the often computationally complex cryptographic algorithms. We provide a broad overview of the hardware/software co-design space for an essential component of many cryptographic protocols. Based on our experience from teaching a master level course about hardware/software co-design, we explore four typical implementation options and provide concrete implementation results. In addition to the aforementioned criteria, resistance against implementation attacks is vital for the security of embedded cryptographic devices. We analyze our four implementations with respect to a security issue that is due to their electromagnetic emanations, and highlight multiple vulnerabilities that can be exploited to break their security. Next, we investigate state-of-the-art implementation options that are supposed to resist these attacks. We detail their implementation cost and show that it is non-trivial to implement these options securely. Our main contribution is a comprehensive analysis of many implementation options with respect to implementation cost and attack resistance on a single common platform.
机译:许多电子应用使用在嵌入式设备中实现的密码算法来提供某种形式的安全性,例如安全性。智能卡(银行,SIM卡,访问控制),手机,wifi路由器等。设备的严格资源限制(通常是硅片面积和功率或能量)以及应用程序的要求(通常是延迟或吞吐量)要求高效通常计算复杂的密码算法的实现。我们提供了许多密码协议必不可少的组成部分的硬件/软件协同设计空间的广泛概述。根据我们在教授有关硬件/软件协同设计的硕士课程方面的经验,我们探索了四个典型的实现方案,并提供了具体的实现结果。除了上述标准之外,抵御实施攻击的能力对于嵌入式密码设备的安全性也至关重要。针对因其电磁辐射而引起的安全性问题,我们分析了四种实施方式,并重点介绍了可利用以破坏其安全性的多个漏洞。接下来,我们研究应该抵抗这些攻击的最新实现方案。我们详细介绍了它们的实施成本,并表明安全地实施这些选项并非易事。我们的主要贡献是针对单个通用平台上的实施成本和抗攻击性,对许多实施选项进行了综合分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号