Cargando…

Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks †

Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fiel...

Descripción completa

Detalles Bibliográficos
Autores principales: Kabin, Ievgen, Dyka, Zoya, Langendoerfer, Peter
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9028562/
https://www.ncbi.nlm.nih.gov/pubmed/35459068
http://dx.doi.org/10.3390/s22083083
_version_ 1784691650522513408
author Kabin, Ievgen
Dyka, Zoya
Langendoerfer, Peter
author_facet Kabin, Ievgen
Dyka, Zoya
Langendoerfer, Peter
author_sort Kabin, Ievgen
collection PubMed
description Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fields of application, confidentiality and data integrity are of utmost importance as human lives depend on them. In this paper, we discuss the resistance of our fast dual-field ECDSA accelerator against side-channel analysis attacks. We present our implementation of a design supporting four different NIST elliptic curves to allow the reader to understand the discussion of the resistance aspects. For two different target platforms—ASIC and FPGA—we show that the application of atomic patterns, which is considered to ensure resistance against simple side-channel analysis attacks in the literature, is not sufficient to prevent either simple SCA or horizontal address-bit DPA attacks. We also evaluated an approach which is based on the activity of the field multiplier to increase the inherent resistance of the design against attacks performed.
format Online
Article
Text
id pubmed-9028562
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-90285622022-04-23 Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks † Kabin, Ievgen Dyka, Zoya Langendoerfer, Peter Sensors (Basel) Article Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fields of application, confidentiality and data integrity are of utmost importance as human lives depend on them. In this paper, we discuss the resistance of our fast dual-field ECDSA accelerator against side-channel analysis attacks. We present our implementation of a design supporting four different NIST elliptic curves to allow the reader to understand the discussion of the resistance aspects. For two different target platforms—ASIC and FPGA—we show that the application of atomic patterns, which is considered to ensure resistance against simple side-channel analysis attacks in the literature, is not sufficient to prevent either simple SCA or horizontal address-bit DPA attacks. We also evaluated an approach which is based on the activity of the field multiplier to increase the inherent resistance of the design against attacks performed. MDPI 2022-04-18 /pmc/articles/PMC9028562/ /pubmed/35459068 http://dx.doi.org/10.3390/s22083083 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Kabin, Ievgen
Dyka, Zoya
Langendoerfer, Peter
Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks †
title Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks †
title_full Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks †
title_fullStr Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks †
title_full_unstemmed Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks †
title_short Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks †
title_sort atomicity and regularity principles do not ensure full resistance of ecc designs against single-trace attacks †
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9028562/
https://www.ncbi.nlm.nih.gov/pubmed/35459068
http://dx.doi.org/10.3390/s22083083
work_keys_str_mv AT kabinievgen atomicityandregularityprinciplesdonotensurefullresistanceofeccdesignsagainstsingletraceattacks
AT dykazoya atomicityandregularityprinciplesdonotensurefullresistanceofeccdesignsagainstsingletraceattacks
AT langendoerferpeter atomicityandregularityprinciplesdonotensurefullresistanceofeccdesignsagainstsingletraceattacks