Cargando…
Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks †
Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fiel...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9028562/ https://www.ncbi.nlm.nih.gov/pubmed/35459068 http://dx.doi.org/10.3390/s22083083 |
_version_ | 1784691650522513408 |
---|---|
author | Kabin, Ievgen Dyka, Zoya Langendoerfer, Peter |
author_facet | Kabin, Ievgen Dyka, Zoya Langendoerfer, Peter |
author_sort | Kabin, Ievgen |
collection | PubMed |
description | Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fields of application, confidentiality and data integrity are of utmost importance as human lives depend on them. In this paper, we discuss the resistance of our fast dual-field ECDSA accelerator against side-channel analysis attacks. We present our implementation of a design supporting four different NIST elliptic curves to allow the reader to understand the discussion of the resistance aspects. For two different target platforms—ASIC and FPGA—we show that the application of atomic patterns, which is considered to ensure resistance against simple side-channel analysis attacks in the literature, is not sufficient to prevent either simple SCA or horizontal address-bit DPA attacks. We also evaluated an approach which is based on the activity of the field multiplier to increase the inherent resistance of the design against attacks performed. |
format | Online Article Text |
id | pubmed-9028562 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-90285622022-04-23 Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks † Kabin, Ievgen Dyka, Zoya Langendoerfer, Peter Sensors (Basel) Article Elliptic curve cryptography (ECC) is one of the commonly used standard methods for encrypting and signing messages which is especially applicable to resource-constrained devices such as sensor nodes that are networked in the Internet of Things. The same holds true for wearable sensors. In these fields of application, confidentiality and data integrity are of utmost importance as human lives depend on them. In this paper, we discuss the resistance of our fast dual-field ECDSA accelerator against side-channel analysis attacks. We present our implementation of a design supporting four different NIST elliptic curves to allow the reader to understand the discussion of the resistance aspects. For two different target platforms—ASIC and FPGA—we show that the application of atomic patterns, which is considered to ensure resistance against simple side-channel analysis attacks in the literature, is not sufficient to prevent either simple SCA or horizontal address-bit DPA attacks. We also evaluated an approach which is based on the activity of the field multiplier to increase the inherent resistance of the design against attacks performed. MDPI 2022-04-18 /pmc/articles/PMC9028562/ /pubmed/35459068 http://dx.doi.org/10.3390/s22083083 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Kabin, Ievgen Dyka, Zoya Langendoerfer, Peter Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks † |
title | Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks † |
title_full | Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks † |
title_fullStr | Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks † |
title_full_unstemmed | Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks † |
title_short | Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks † |
title_sort | atomicity and regularity principles do not ensure full resistance of ecc designs against single-trace attacks † |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9028562/ https://www.ncbi.nlm.nih.gov/pubmed/35459068 http://dx.doi.org/10.3390/s22083083 |
work_keys_str_mv | AT kabinievgen atomicityandregularityprinciplesdonotensurefullresistanceofeccdesignsagainstsingletraceattacks AT dykazoya atomicityandregularityprinciplesdonotensurefullresistanceofeccdesignsagainstsingletraceattacks AT langendoerferpeter atomicityandregularityprinciplesdonotensurefullresistanceofeccdesignsagainstsingletraceattacks |