Implementation of integrated 1D hybrid phononic crystal through miniaturized programmable virtual inductances

Abstract—Power-analysis (PA) based side-channel attacks are effective methods to attack RSA encryption systems and ellipticcurve cryptography (ECC). In this paper, we describe PA-based side-channel attacks aiming to extract the (randomly chosen) private key for an ECC-based cryptosystem in detail. We assume that for the cryptosystem to be attacked the private key will not be available for more than one basic operation. Hence, statistical methods, commonly applied in differential power analysis attacks to enhance the signal-to-noise ratio (SNR), may not be applied. To reach the required SNR for a successful attack, we have extended the analysis by frequency-selective filtering followed by data fragmentation and correlation. We show that the implementation of a “double-and-add-always” scheme for ECC point multiplication, which according to literature has been considered safe against simple PA, will not resist our analytical attack method. We argue that memory accesses are the root cause for a successful attack, and propose an extension of the double-andadd-always scheme to harden ECC hardware implementations adequately.
Keywords— Power Analysis, SPA, DPA, side channel, ECC Cryptosystem, ECDSA, FPGA, Balancing power consumption


Edgar A Flores Parra, Andrea Bergamini, Lars Kamm, Paul Zbinden, Paolo Ermanni, 2017
Zeitschrift / Sammelband:
Smart Materials and Structures, Volume 26, Number 6
Ort / Verlag:
UK / IOP Publishing Ltd