首页> 外文会议>Euromicro Conference on Digital System Design >On Power-Analysis Resistant Hardware Implementations of ECC-Based Cryptosystems
【24h】

On Power-Analysis Resistant Hardware Implementations of ECC-Based Cryptosystems

机译:基于ECC的密码系统的抗功耗分析的硬件实现

获取原文
获取外文期刊封面目录资料

摘要

Power-analysis (PA) based side-channel attacks are effective methods to attack RSA encryption systems and elliptic-curve cryptography (ECC). In this paper, we describe PA-based side-channel attacks aiming to extract the (randomly chosen) private key for an ECC-based cryptosystem in detail. We assume that for the cryptosystem to be attacked the private key will not be available for more than one basic operation. Hence, statistical methods, commonly applied in differential power analysis attacks to enhance the signal-to-noise ratio (SNR), may not be applied. To reach the required SNR for a successful attack, we have extended the analysis by frequency-selective filtering followed by data fragmentation and correlation. We show that the implementation of a "double-and-add-always" scheme for ECC point multiplication, which according to literature has been considered safe against simple PA, will not resist our analytical attack method. We argue that memory accesses are the root cause for a successful attack, and propose an extension of the double-and-add-always scheme to harden ECC hardware implementations adequately.
机译:基于功率分析(PA)的边信道攻击是攻击RSA加密系统和椭圆曲线密码术(ECC)的有效方法。在本文中,我们详细描述了基于PA的侧信道攻击,旨在为基于ECC的密码系统提取(随机选择的)私钥。我们假设要使密码系统受到攻击,私钥将不能用于多个基本操作。因此,可能不会应用通常用于差分功率分析攻击中以增强信噪比(SNR)的统计方法。为了达到成功进行攻击所需的SNR,我们通过频率选择性滤波,数据碎片和相关性扩展了分析范围。我们表明,针对ECC点乘法的“总是加双”方案的实现(根据文献被认为对简单的PA是安全的)不会抵抗我们的分析攻击方法。我们认为内存访问是成功进行攻击的根本原因,并提出了“双重添加”方案的扩展,以充分强化ECC硬件实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号